Nguyen The Duc

@ducnt_

Just another web warrior ⚔️ | Security Researcher | Sr. Security Engineer | CTF player && | Bug bounty hunter

Hồ Chí Minh, Việt Nam  
Vrijeme pridruživanja: veljača 2017.

Tweetovi

Blokirali ste korisnika/cu @ducnt_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ducnt_

  1. Prikvačeni tweet
    31. ožu

    I really happy to share an article that bypass Akamai web application firewall and exploit a SQL Injection vulnerability. Hope this article will help someone in the same situation :).

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    28. svi
    Poništi
  3. proslijedio/la je Tweet
    27. svi

    Cross origin access with exception object + full exploit (reward: $25633)

    Poništi
  4. proslijedio/la je Tweet
    25. svi

    Last month, I found a DOM XSS that led to RCE in . Here is the write-up: Most of the credit goes to

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    26. svi

    An impossible lab has been solved! Congratulations to who solved the attribute context arbitrary code lab. With the following solution: ?a=`+alert(document.domain);//&x=%22oncut=%22eval(%27`%27%2bURL)' the length limit has now been reduced to 20.

    Poništi
  6. proslijedio/la je Tweet
    25. svi
    Poništi
  7. proslijedio/la je Tweet
    25. svi

    SSRF + CRLF + HTTP Pipeline + Docker API = RCE… How dangerous is Request Splitting, a vulnerability in Golang or how we found the RCE in Portainer and hacked Uber

    Poništi
  8. proslijedio/la je Tweet
    22. svi
    Poništi
  9. proslijedio/la je Tweet
    22. svi
    Poništi
  10. proslijedio/la je Tweet
    22. svi

    CVE-2020-9484 Tomcat RCE漏洞分析

    Poništi
  11. proslijedio/la je Tweet
    21. svi

    Here is a write-up of a very interesting RCE bug I found on Google Cloud Deployment Manager for the :

    Poništi
  12. proslijedio/la je Tweet
    20. svi

    Aerial ‘smoke screen’ used to protect ships in battle in the 20th century.

    Poništi
  13. proslijedio/la je Tweet
    15. svi

    I blogged about some interesting behavior which lead to an internal auth bypass. Smuggling HTTP headers through reverse proxies:

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    19. svi

    Increasing disk and memory size make Integer Overflow great again🤣

    Poništi
  15. proslijedio/la je Tweet
    5. velj

    Text fragments will soon be available in Chromium land. You can then use `#:~:text=` to highlight certain text. 😲 🔗 Chrome status: 🔗 Spec: Video alt: Usage of text fragments to highlight text on wikipedia

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    16. svi

    😮 Google open sourced their fuzzing dictionaries!

    Poništi
  17. proslijedio/la je Tweet
    18. svi
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    16. svi

    I made a tool to generate Sec/Dictionary files for content discovery by scrapping GitHub for File/Folder Names and GET/POST & HTTP from PHP files. So far its examined 5,256,950 files from 39069 repositories, check the results

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    12. svi

    One more to the pocket : CVE-2020-0901 - TALOS-2020-1015 Microsoft Office Excel s_Schema Code Execution Vulnerability

    Poništi
  20. proslijedio/la je Tweet
    12. svi
    Poništi
  21. 12. svi

    I and my teammate really happy to share our latest research / doing bug bounty about WAF exploit / bypass. This is a popular WAF application from a vendor in Vietnam, hope you like it 🥰.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·