Soroush Dalili

@irsdl

Another ethical web appsec guy - breaker 〉builder - very limited BB hunter - delimiter characters fan - RT/LK can be an accident or not "'›|&;${3-1}\

World of Sec! 0xC0000005 Err
Gått med augusti 2009

Tweets

Du blockerade @irsdl

Är du säker på att du vill visa dessa Tweets? Visning av Tweets kommer inte att häva blockeringen av @irsdl

  1. Fastnålad Tweet
    25 apr.

    With the release of my ViewState plugin for , here is my blog post on Exploiting Deserialisation in ASPNET via ViewState:

    Visa denna tråd
    Ångra
  2. Retweetade
    31 okt.

    Did you know you can use the Connection header to delete other headers? Interesting research lead by :

    Visa denna tråd
    Ångra
  3. 31 okt.

    Perhaps also join in even if you are a fan ;)

    Ångra
  4. 31 okt.

    Probably the last time I am doing this with this laptop - research continues! I am going to miss my stickers

    Ångra
  5. Retweetade
    27 okt.

    Oh shit there is a video that backs up the ‘don’t congratulate Obama’ .. Can’t wait for the announcement..

    Ångra
  6. Retweetade
    25 okt.

    As I'm currently missing and so can't troll in person here's a blog about the recent changes to my .NET Remoting Exploit tool to bypass Low Type Filtering .

    Ångra
  7. Retweetade
    25 okt.

    Advisory: OneDrive/SharePoint File Picker Access Token Hijacking - by Adam Roberts

    Ångra
  8. Retweetade
    24 okt.

    I know DoS attacks are deeply unsexy, and I'm still somewhat in shock that I ever wrote an entire post about them. The core aim of this post is to illustrate how in the right circumstances they can be fun, high-impact and profitable

    Visa denna tråd
    Ångra
  9. Retweetade
    21 okt.

    While not officially confirmed yet, this is very likely to be true. Also it’s worth remembering that some of the attacks results never see the light of public news because targets prefer to remain silent either for intel obervations or simply avoid empowering attackers by an ack.

    Ångra
  10. Retweetade
    5 okt.

    Can’t stress enough the importance of patching affected VPN products. We’re seeing multiple groups exploiting these vulnerabilities.

    Ångra
  11. Retweetade
    17 okt.
    Ångra
  12. 16 okt.
    Ångra
  13. Retweetade
    14 okt.

    OWASP Birmingham is pleased to announce it's hosting a Capture the Flag meetup in November supported by Kainos and Secure Code Warrior

    Ångra
  14. Retweetade
    14 okt.

    This is so insane. This was a straight-forward solution for Buggy .Net from

    Visa denna tråd
    Ångra
  15. Retweetade
    12 okt.

    HITCON CTF 2019 Quals is ongoing now! and I designed an XSS challenge this time and there are two solutions at least, could you find that? :D http://3.114.5.202/

    Ångra
  16. Retweetade
    11 okt.

    Can't we have the old school instant (bit broken) render AND the new shiny render button, if we need it?

    Ångra
  17. 10 okt.
    Ångra
  18. Retweetade
    7 okt.

    Updated my tool to exploit .NET remoting services to use a new (unpatched) technique to bypass Low Type Filter to get full serialization exploitation. Abuses the lease feature present on all MBR objects. . Don't use .NET remoting in production code!

    Ångra
  19. Retweetade
    6 okt.
    Svar till
    Ångra
  20. 3 okt.

    This is the command to activate all the bots from 3 years ago: WAKE UP AGAIN AND JOIN THE COLLECTIVE NOW! He should really be proud of himself to type these words correctly!

    Ångra
  21. 3 okt.

    Just a friendly reminder that is still mine! 🤓 😇

    Ångra

Hämtningen verkar ta ett tag

Twitter kan vara överbelastat eller ha tillfälliga problem. Försök igen eller besök Twitter Status om du vill ha mer information.

    Du kanske också gillar

    ·