Nguyen The Duc

@ducnt_

Just another web warrior ⚔️ | Security Researcher | Sr. Security Engineer | CTF player && | Bug bounty hunter

Hồ Chí Minh, Việt Nam  
Se unió en febrero de 2017

Tweets

Bloqueaste a @ducnt_

¿Estás seguro de que quieres ver estos Tweets? Ver los Tweets no desbloqueará a @ducnt_

  1. Tweet fijado
    31 mar.

    I really happy to share an article that bypass Akamai web application firewall and exploit a SQL Injection vulnerability. Hope this article will help someone in the same situation :).

    Mostrar este hilo
    Deshacer
  2. retwitteó
    hace 46 minutos
    Deshacer
  3. retwitteó
    30 abr.

    The fuzzing team has been developing a new fuzzer to help identify security vulnerabilities in the implementation of WebAPIs in Firefox. This fuzzer, which we’re calling Domino, leverages the WebAPIs’ own WebIDL definitions as a fuzzing grammar.

    Mostrar este hilo
    Deshacer
  4. retwitteó
    29 abr.

    Detailing CVE-2020-0932 - a now patched RCE bug in reported to us by an anonymous researcher. The blog lays out how code exec is possible using TypeConverters and provides video demonstration and PoC. Read the post at

    Deshacer
  5. retwitteó
    27 abr.

    Releasing another side-project: CursedChrome. A Chrome-extension implant that turns victim Chrome browsers into HTTP proxies. Using these proxies you can browse the web authenticated as your victims for all of their websites. Setup takes only 5-10 mins 👍

    Mostrar este hilo
    Deshacer
  6. retwitteó
    27 abr.

    We’ve just published SitRep, our host triage tool developed by . It brings extensibility and OpSec considerations to the triage process:

    Deshacer
  7. retwitteó
    27 abr.

    Check out my write-up about an account takeover vulnerability I found in Microsoft Teams. By sending a GIF, you could get access to the user's data and "ultimately take over an organization's entire roster of Teams accounts".

    Mostrar este hilo
    Deshacer
  8. retwitteó
    25 abr.

    Exploit Proof-of-Concept for CVE-2020-12138, Privilege Escalation in ATI Technologies Inc. driver 'atillk64.sys'. Thanks to all those cited for helping me along the way.

    Mostrar este hilo
    Deshacer
  9. retwitteó
    24 abr.

    support added and pushed to master, go and automate all the takeovers and DNS related detections and vulnerabilities. We also updated guide document with DNS request template information

    Deshacer
  10. retwitteó
    28 mar.
    Deshacer
  11. retwitteó
    24 abr.

    v1.33 released with a ton of new features. Thanks to for the great PRs! You can see whats new here

    Deshacer
  12. retwitteó
    22 abr.

    New blog post: CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag

    Deshacer
  13. retwitteó
    22 abr.
    Deshacer
  14. retwitteó
    16 abr.

    CVE-2020-7066 is a pretty neat SSRF vector in PHP; URL parsing differences strike yet again.

    Deshacer
  15. retwitteó
    21 abr.

    My writeup for the haproxy http2 bug (CVE-2020-11100) is now public: . Includes a PoC exploit to demonstrate RCE against Ubuntu 19.10.

    Deshacer
  16. retwitteó
    21 abr.
    Deshacer
  17. retwitteó
    21 abr.

    This is a simple story about how to control back to web app from SQL with SessionState deserialization (article only in Traditional Chinese)

    Deshacer
  18. retwitteó
    20 abr.

    It's here! Details on how we achieved RCE are available. Enjoy! "I'll ask your body": SMBGhost pre-auth RCE abusing Direct Memory Access structs by ()

    Deshacer
  19. retwitteó
    19 abr.
    Deshacer
  20. retwitteó
    19 abr.

    New write up - "Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts"

    Deshacer
  21. retwitteó
    23 mar.

    POC: http://localhost:8000/test/?q=20) = 1 OR (select utl_inaddr.get_host_name((SELECT version FROM v%24instance)) from dual) is null%20 OR (1%2B1 analysis:

    Deshacer

Parece que el contenido está tardando un poco en cargarse.

Puede que Twitter esté saturado o experimentando un problema momentáneo. Inténtalo de nuevo o visita el Estado de Twitter para más información.

    También te puede gustar

    ·