Nguyen The Duc

@ducnt_

Just another web warrior ⚔️ | Security Researcher | Sr. Security Engineer | CTF player && | Bug bounty hunter

Hồ Chí Minh, Việt Nam  
Inscrit en février 2017

Tweets

Vous avez bloqué @ducnt_

Êtes-vous sûr de vouloir voir ces Tweets ? Les voir ne débloquera pas @ducnt_

  1. Tweet épinglé
    31 mars

    I really happy to share an article that bypass Akamai web application firewall and exploit a SQL Injection vulnerability. Hope this article will help someone in the same situation :).

    Afficher cette discussion
    Supprimer
  2. a retweeté
    il y a 46 minutes
    Supprimer
  3. a retweeté
    30 avr.

    The fuzzing team has been developing a new fuzzer to help identify security vulnerabilities in the implementation of WebAPIs in Firefox. This fuzzer, which we’re calling Domino, leverages the WebAPIs’ own WebIDL definitions as a fuzzing grammar.

    Afficher cette discussion
    Supprimer
  4. a retweeté
    29 avr.

    Detailing CVE-2020-0932 - a now patched RCE bug in reported to us by an anonymous researcher. The blog lays out how code exec is possible using TypeConverters and provides video demonstration and PoC. Read the post at

    Supprimer
  5. a retweeté
    27 avr.

    Releasing another side-project: CursedChrome. A Chrome-extension implant that turns victim Chrome browsers into HTTP proxies. Using these proxies you can browse the web authenticated as your victims for all of their websites. Setup takes only 5-10 mins 👍

    Afficher cette discussion
    Supprimer
  6. a retweeté
    27 avr.

    We’ve just published SitRep, our host triage tool developed by . It brings extensibility and OpSec considerations to the triage process:

    Supprimer
  7. a retweeté
    27 avr.

    Check out my write-up about an account takeover vulnerability I found in Microsoft Teams. By sending a GIF, you could get access to the user's data and "ultimately take over an organization's entire roster of Teams accounts".

    Afficher cette discussion
    Supprimer
  8. a retweeté
    25 avr.

    Exploit Proof-of-Concept for CVE-2020-12138, Privilege Escalation in ATI Technologies Inc. driver 'atillk64.sys'. Thanks to all those cited for helping me along the way.

    Afficher cette discussion
    Supprimer
  9. a retweeté
    24 avr.

    support added and pushed to master, go and automate all the takeovers and DNS related detections and vulnerabilities. We also updated guide document with DNS request template information

    Supprimer
  10. a retweeté
    28 mars
    Supprimer
  11. a retweeté
    24 avr.

    v1.33 released with a ton of new features. Thanks to for the great PRs! You can see whats new here

    Supprimer
  12. a retweeté
    22 avr.

    New blog post: CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag

    Supprimer
  13. a retweeté
    22 avr.
    Supprimer
  14. a retweeté
    16 avr.

    CVE-2020-7066 is a pretty neat SSRF vector in PHP; URL parsing differences strike yet again.

    Supprimer
  15. a retweeté
    21 avr.

    My writeup for the haproxy http2 bug (CVE-2020-11100) is now public: . Includes a PoC exploit to demonstrate RCE against Ubuntu 19.10.

    Supprimer
  16. a retweeté
    21 avr.
    Supprimer
  17. a retweeté
    21 avr.

    This is a simple story about how to control back to web app from SQL with SessionState deserialization (article only in Traditional Chinese)

    Supprimer
  18. a retweeté
    20 avr.

    It's here! Details on how we achieved RCE are available. Enjoy! "I'll ask your body": SMBGhost pre-auth RCE abusing Direct Memory Access structs by ()

    Supprimer
  19. a retweeté
    19 avr.
    Supprimer
  20. a retweeté
    19 avr.

    New write up - "Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts"

    Supprimer
  21. a retweeté
    23 mars

    POC: http://localhost:8000/test/?q=20) = 1 OR (select utl_inaddr.get_host_name((SELECT version FROM v%24instance)) from dual) is null%20 OR (1%2B1 analysis:

    Supprimer

Le chargement semble prendre du temps.

Twitter est peut-être en surcapacité ou rencontre momentanément un incident. Réessayez ou rendez-vous sur la page Twitter Status pour plus d'informations.

    Vous aimerez peut-être aussi

    ·