Nicolas Grégoire Profile Banner
Nicolas Grégoire Profile
Nicolas Grégoire

@Agarri_FR

Followers
26,156
Following
607
Media
346
Statuses
12,987

Web hacker and Burp Suite Pro trainer Refer to for trainings Follow @MasteringBurp for free tips and tricks

South Luberon, France
Joined May 2011
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@Agarri_FR
Nicolas Grégoire
11 months
I just updated my "Freebies" page, in order to add the content I recently published: - the 30' talk given at @NorthSec_io - the 70' hands-on workshop streamed during #nahamcon2023 The page now contains direct links to the slides and videos, enjoy! 🎁
2
103
301
@Agarri_FR
Nicolas Grégoire
3 years
I think I'll use this link quite often
19
148
564
@Agarri_FR
Nicolas Grégoire
9 years
XXE inside a SOAP node: <soap:Body><foo><![CDATA[<!DOCTYPE doc [<!ENTITY % dtd SYSTEM " http://0x0:22/"> %dtd;]><xxx/>]]></foo></soap:Body>
4
198
528
@Agarri_FR
Nicolas Grégoire
6 months
Not your typical SQLi vector... 😈
Tweet media one
@Chocologicall
Jia Hao
8 months
I've finally published the advisories regarding the Trend Micro bugs that I shared at #HITCON ! Do check them out at @starlabs_sg 's advisory page: 🏌️‍♂️CVE-2023-32530 is an interesting case of SQLi to RCE:
0
42
167
4
56
335
@Agarri_FR
Nicolas Grégoire
11 months
On Friday, my free @Burp_Suite workshop for #NahamCon will be published 🎁 You'll get: - the video itself (70 minutes) - the slides as a PDF (35 pages) - two Docker containers hosting the targets The stream starts at 11:10 AM PDT aka 20:10 CET ⌚️
11
70
300
@Agarri_FR
Nicolas Grégoire
4 years
I published this trick in 2015
@thedawgyg
dawgyg - WoH
4 years
When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018) #bugbountytip #bugbounty
14
362
1K
8
80
297
@Agarri_FR
Nicolas Grégoire
1 year
Here’s the slides of the talk I gave yesterday at NorthSec 2023 "Tips and tricks for Burp Suite Pro, ten years later" #nsec23 @NorthSec_io
5
94
296
@Agarri_FR
Nicolas Grégoire
5 years
If you like this kind of @Burp_Suite tips, here's ~100 pages of them. That was published in 2013 but most of it is still valid.
3
109
290
@Agarri_FR
Nicolas Grégoire
7 years
If you're OK with Israel pwing Kaspersky, replace the 1st word with Russia or Iran, and the 2nd with Symantec or Checkpoint... Still OK?
16
115
256
@Agarri_FR
Nicolas Grégoire
11 months
Slides from my #NahamCon workshop 🎁
3
78
261
@Agarri_FR
Nicolas Grégoire
4 years
URLs are complex, and filters are hard to get right. Here's a bypass I used yesterday. Nothing crazy, but it worked.
Tweet media one
3
54
255
@Agarri_FR
Nicolas Grégoire
5 months
It seems that every few months, some people discover my SSRF talk from 2015 and learn from it. So I'll post the links again 😇 - slides - English-speaking video - French-speaking video
4
71
245
@Agarri_FR
Nicolas Grégoire
6 years
I just realized that encoded IP addresses (like "0177.1") work in X-Forwarded-For HTTP headers too. And that's useful when somebody decided to blacklist some specific values...
5
74
242
@Agarri_FR
Nicolas Grégoire
3 years
Looking for injectable DTD files *inside* JAR archives may easily be overlooked. A good read from @iamnoooob 👍 #XXE
2
88
231
@Agarri_FR
Nicolas Grégoire
5 years
I’m suprised that CVE-2018-13382 (a trivial « backdoor » in Fortigate SSL VPN) didn’t get much attention, even after @orange_8361 ´s talks in Vegas...
5
69
213
@Agarri_FR
Nicolas Grégoire
7 years
<?xml version="1.0" encoding="UTF-7"?> +ADwAIQ-DOCTYPE x +AFsAPAAh-ENTITY z SYSTEM +ACI-/etc/passwd+ACIAPgBdAD4APA-x+AD4AJg-z+ADsAPA-/x+AD4
3
67
213
@Agarri_FR
Nicolas Grégoire
5 years
On December 25th 1998 (more 20 years ago!), rain.forest.puppy covered both SQL injection and SSRF in his Phrack 54 article
5
62
209
@Agarri_FR
Nicolas Grégoire
4 years
#ProTip For a stealthier @Burp_Suite usage, tick "Proxy > Options > Miscellaneous > Disable web interface"
@AffableKraut
Eric Brandel
4 years
@evilsocket They've got some fun JS on their website. Among other things, it attempts to detect tools like Burpsuite, ZAP, Fiddler, etc and probably does a pretty good job of it.
Tweet media one
0
15
40
3
66
205
@Agarri_FR
Nicolas Grégoire
4 years
#ProTip When doing content discovery with @Burp_Suite Intruder, don't only rely on responses size or status code. A quick Grep Extract on "<title>(.*?)</title>" may go a long way...
1
68
202
@Agarri_FR
Nicolas Grégoire
3 years
Deep link on mobile app ➡️ Host-relative SSRF ➡️ Account takeover 🦾 (affecting @Pinterest )
Tweet media one
2
60
194
@Agarri_FR
Nicolas Grégoire
3 years
In 2015, I was told that SSRF was just an inefficient port-scanning method 💩 But we nonetheless pwned Cloud metadata services for years 🏴‍☠️ And now there’s SSRF-to-RCE vulns in COTS products like Exchange and vRealize 👻😎
1
27
192
@Agarri_FR
Nicolas Grégoire
4 years
Here's a long thread complementing my interview with @NahamSec . Feel free to skip it...
3
51
191
@Agarri_FR
Nicolas Grégoire
6 months
It’s so bad that I wrote a thread 🧵 ⤵️
@disclosedh1
publiclyDisclosed
6 months
HackerOne disclosed a bug submitted by @bebiksior : - Bounty: $2,500 #hackerone #bugbounty
Tweet media one
19
21
165
5
74
188
@Agarri_FR
Nicolas Grégoire
4 years
Looking for a master's thesis on bug hunting automation? Here it is! (by @s14ve )
4
44
188
@Agarri_FR
Nicolas Grégoire
4 years
Do you know I also maintain a list of free high-quality @Burp_Suite resources?
4
56
186
@Agarri_FR
Nicolas Grégoire
5 years
No need to update my old @Burp_Suite Tips & Tricks talk anymore: @JR0ch17 just killed the game with his @Bugcrowd video! #ImproveYourWorkflow
1
65
181
@Agarri_FR
Nicolas Grégoire
4 years
Burp Suite extensions I recommend (in no specific order): AutoRepeater, Content Type Converter, Param Miner, Request Minimizer, Backslash Powered Scanner, ActiveScan++, Taborator, Paramalyzer, Upload Scanner, Hackvertor, Piper, Request Timer, Logger++, Add Custom Header
4
44
187
@Agarri_FR
Nicolas Grégoire
4 months
Best tweets from 2023 💎 // cc @hakluke @TomNomNom
Tweet media one
5
9
185
@Agarri_FR
Nicolas Grégoire
5 months
If you like this kind of content, read my slides 😉
@hakluke
hakluke
5 months
4 ways to bypass SSRF protections 🧵👇
Tweet media one
7
125
540
1
43
185
@Agarri_FR
Nicolas Grégoire
3 years
Something pentesters already know: registering with TRUE as your name may yield interesting results (it also works with NULL, UNDEFINED, CON, PRN, ...) #BugBountyTips
@RachelTrue
Rachel True
3 years
Anyone else getting this error from Apple iCloud ? In past or now? I’m 6 months deep freeze & looking for any help. I rem dead coding languages like kobalt.. & this seems like an Apple coding issue — not hardware
Tweet media one
175
1K
6K
4
41
174
@Agarri_FR
Nicolas Grégoire
2 years
My "Burp Pro: Real-life tips and tricks" talk was published in 2013. In order to celebrate its 10 year, I'll work on a brand new version for 2023 👨‍🏫
3
10
166
@Agarri_FR
Nicolas Grégoire
7 years
Exploiting the Intel AMT bug using @Burp_Suite (by @TenableSecurity )
Tweet media one
3
102
158
@Agarri_FR
Nicolas Grégoire
2 years
Reminder: when dealing with SQL injections, never use tautologies like "OR 1=1", they're too dangerous 🚨
@bughuntar
MD Sagor Hossain (Professor) 🇧🇩
2 years
SQL injection on login page.🥰🥰🥰
Tweet media one
34
526
2K
8
26
162
@Agarri_FR
Nicolas Grégoire
5 years
I'll give one or two _FREE_ workshops covering @Burp_Suite v2 in the next months. Stay tuned for dates/location/...
13
25
160
@Agarri_FR
Nicolas Grégoire
3 years
This PE exe, generated by a special GCC, is also a ZIP archive and can be executed on Windows (of course) but also Unix (not limited to Linux) and MacOS 🤯 By @justinetunney
5
50
160
@Agarri_FR
Nicolas Grégoire
5 years
#ProTip If you're in SSRF, knowing what Consul is and how to exploit is often useful
2
70
160
@Agarri_FR
Nicolas Grégoire
4 years
An excellent talk by @ajxchapman : clear methodology, novel bugs and interesting links 💯
1
50
158
@Agarri_FR
Nicolas Grégoire
7 years
A short but decent list of @Burp_Suite tips by @lanmaster53
2
99
154
@Agarri_FR
Nicolas Grégoire
8 years
#ProTip If you use @Burp_Suite , read my "Tips and Tricks" slides
2
86
146
@Agarri_FR
Nicolas Grégoire
4 years
Wanna grep inside PDF files from the CLI? Me too! So I wrote a script...
4
40
145
@Agarri_FR
Nicolas Grégoire
4 years
I've a plan where I rent a huge house in the sunny country-side and invite (for $$$) the best bug hunters worldwide, for an exclusive week of training, yummy food and poolside chatters. Not for this year, unfortunately. Fuc*ing pandemic.
15
5
145
@Agarri_FR
Nicolas Grégoire
6 years
CVE-2018-1260: Remote Code Execution with spring-security-oauth2, found by @h3xstream
0
104
131
@Agarri_FR
Nicolas Grégoire
11 months
One week left before NahamCon... 🏁 My workshop is ready, can't wait to share it... 🛠️
Tweet media one
3
17
133
@Agarri_FR
Nicolas Grégoire
11 months
This bypass by @Akamai *may* be useful when exploiting Windows-based SSRF vulnerabilities
Tweet media one
0
25
130
@Agarri_FR
Nicolas Grégoire
3 years
Today, my company is 10 years old 🎂
15
1
128
@Agarri_FR
Nicolas Grégoire
19 days
Whoever uses IP address 192.168.0.100 gets a 15-minute window after reboot to gain RCE as root on some @TPLINK devices 🧐
2
15
128
@Agarri_FR
Nicolas Grégoire
3 years
#Protip Need to go really fast and HEAD is disabled? Use GET and the Range header...
4
20
126
@Agarri_FR
Nicolas Grégoire
6 years
If you ever have to compile Python scripts to Windows executables, have a look at this Docker image. It's the cleanest / easiest solution I found...
0
69
122
@Agarri_FR
Nicolas Grégoire
6 years
I just noticed that @Burp_Suite includes an action named "Forward intercepted Proxy request and intercept the response". I mapped it to Ctrl+Shift+F and OMG it's so useful!
9
37
119
@Agarri_FR
Nicolas Grégoire
5 years
#ProTip If you need to mix Turbo Intruder with other @Burp_Suite extensions (like Hackvertor or Logger++), simply add "engine=Engine.BURP" to RequestEngine(). Note: the custom HTTP stack is _much_ faster than the default one, so this change will slow down things
0
33
120
@Agarri_FR
Nicolas Grégoire
5 years
I've to say that @WebSecAcademy , an online self-training by @Burp_Suite authors, is really good! 💯
3
23
115
@Agarri_FR
Nicolas Grégoire
8 years
<!ENTITY % pe1 SYSTEM "<?php print $_GET['x'] ?>"> <!ENTITY % pe2 "<!ENTITY & #37 ; pe3 SYSTEM '_%pe1;_://'>"> %pe2; %pe3;
4
44
113
@Agarri_FR
Nicolas Grégoire
2 years
OWASP's example implementation of check_private_ip() is quite naive. It can be bypassed with 0x7f.0.0.1 #SSRF
3
26
115
@Agarri_FR
Nicolas Grégoire
5 years
If you want to fuzz structured formats (like XML or JSON), give AFL++ a try!
1
42
113
@Agarri_FR
Nicolas Grégoire
4 years
#ProTip When brute-forcing static files (f.e. /plugins/$name$/readme.txt), keep an eye on the returned Last-Modified header (possibly via Grep - Extract). A bunch of things can be inferred from the results...
1
30
110
@Agarri_FR
Nicolas Grégoire
4 years
Back to blogging! CSRF-protected forms, @Burp_Suite Intruder, and no macros. A step-by-step walkthrough based on @DVWA that you can follow along at home...
3
46
108
@Agarri_FR
Nicolas Grégoire
4 years
Requested two years ago and released today 🎁
@Burp_Suite
Burp Suite
4 years
Burp Suite 2020.9 released, with side-by-side request/response view in Proxy history and elsewhere.
24
136
579
3
13
110
@Agarri_FR
Nicolas Grégoire
6 years
Finally exploited this MarsDB NoSQL injection :-D Thanks @owasp_juiceshop for the testbed, that was fun!
Tweet media one
3
24
109
@Agarri_FR
Nicolas Grégoire
2 years
TIL that http://unix:/var/run/docker.sock:/containers/json is a valid URL for got, the "Human-friendly and powerful HTTP request library for Node.js" 🤯
1
14
112
@Agarri_FR
Nicolas Grégoire
5 years
LAN-only "XXE over UDP" in Jenkins Swarm plugin, with victim-initiated exploitation: that’s _not_ a common finding! CVE-2019-10309 by @TalosSecurity
0
54
108
@Agarri_FR
Nicolas Grégoire
5 years
#BurpSuite Tip of the day - How to download movies from Arte Replay? Simply access the target page in your browser, then search for "/api/player/v1/config/" in Proxy History and pick a MP4 URL from the JSON response. Give it to wget, you're done!
Tweet media one
2
28
107
@Agarri_FR
Nicolas Grégoire
4 years
#ProTip #BurpSuite Wanna filter out these pesky OPTIONS requests from Proxy History?
Tweet media one
2
22
104
@Agarri_FR
Nicolas Grégoire
4 years
People teaching me how IP addresses encoding works... 🤣🤣🤣
8
2
107
@Agarri_FR
Nicolas Grégoire
4 years
Once again,100% of the trainings listed on (5 out of 5) are from myself. I wonder what the other trainers are doing... 🧐
6
12
105
@Agarri_FR
Nicolas Grégoire
4 years
If you follow me for @Burp_Suite related news, let me tell you I recently created a dedicated account called @MasteringBurp 👀
9
33
104
@Agarri_FR
Nicolas Grégoire
6 years
The @mozilla XSLT bugs I reported in 2017 are now public. As you can see from the reports, I directly fuzzed xpcshell: the target is fast even when instrumented and crashes are easy to reproduce (simply exec a JS from the CLI). #Thread
3
45
107
@Agarri_FR
Nicolas Grégoire
4 years
That’s a crazy bug 🤯
0
33
107
@Agarri_FR
Nicolas Grégoire
5 years
#SSRF #ProTip Sometimes, the server appends something (path, parameters, ...) to an URL your control. Simply add "#" to your URL, that may work!
4
48
105
@Agarri_FR
Nicolas Grégoire
3 years
SSRF made its way to the @owasp Top 10. Finally!
@webtonull
Erlend Oftedal
3 years
I do like the inclusion of SSRF though. Hat tip to @Agarri_FR as one of the pioneers.
3
0
3
2
13
104
@Agarri_FR
Nicolas Grégoire
7 years
Executing code on (Dell, ...) monitors via HDMI, USB or DisplayPort
@XipiterSec
Senrio
8 years
There's a tiny "PC" *inside* your monitor! And they're hjackable! Here's an exploit for Dell
Tweet media one
8
649
694
2
87
103
@Agarri_FR
Nicolas Grégoire
2 years
I don't remember who shared this trick with me, but the more I use it, the more I like it: in regex strings, escape dots with '[.]' instead of '\.', it's much more readable!
3
6
101
@Agarri_FR
Nicolas Grégoire
6 years
Reminder for @defcon attendees: in Europe, we have large hackercamps too! A few differences though: no hotel security (because we use ⛺️), lockpicks are super welcome, no (need for) AC, valued privacy, our own phone network, etc.
4
29
102
@Agarri_FR
Nicolas Grégoire
5 years
Please keep in mind that #FAIL is just an acronym for "First Attempt In Learning" 😉
2
34
102
@Agarri_FR
Nicolas Grégoire
9 years
Small XXE trick (for Java): file:///proc/self/cwd/../config/
2
41
96
@Agarri_FR
Nicolas Grégoire
2 years
I ditched out LibreOffice for my 600+ training slides. I now use MARP, and I'm very happy with the results. On the left, the Markdown code as seen in VS Code On the right, the resulting PDF
Tweet media one
Tweet media two
5
8
99
@Agarri_FR
Nicolas Grégoire
2 years
SSRF in @evernote , by @NeolexSecurity 🤓 The target URL is base64-encoded in the path, and # is required in order to bypass the whitelist 👍
1
26
95
@Agarri_FR
Nicolas Grégoire
4 years
You asked for online trainings, and we listened 😉 Here is the brand new webshop, with 20% off on all trainings (until October 11th). 5 public sessions to come, in 4 time zones and 2 languages!
4
51
97
@Agarri_FR
Nicolas Grégoire
4 years
Submit a XSS validation bypass in WP, wait 18 months, get $350
@disclosedh1
publiclyDisclosed
4 years
WordPress disclosed a bug submitted by @irsdl : - Bounty: $350 #hackerone #bugbounty
Tweet media one
1
3
18
3
13
92
@Agarri_FR
Nicolas Grégoire
2 years
😮 100+ new followers today🤯 Hi everybody! 👋 Interested in Burp suite? Check my dedicated account @MasteringBurp 🛠️ Want to deep dive into SSRF? Check my talks 👨‍🏫
2
7
95
@Agarri_FR
Nicolas Grégoire
4 years
Remove appended data with # ✅ Convert POST to GET via redirect ✅ Combo! 🎮
@disclosedh1
publiclyDisclosed
4 years
Kubernetes disclosed a bug submitted by @reeverzax : - Bounty: $5,000 #hackerone #bugbounty
Tweet media one
0
29
118
5
26
96
@Agarri_FR
Nicolas Grégoire
1 year
This link is valid and points (unsurprisingly) to a nice article on Unicode URLs https://🅂𝖍𝐤ₛᵖ𝒓.ⓜ𝕠𝒃𝓲/🆆🆃🅵/
2
13
93
@Agarri_FR
Nicolas Grégoire
5 years
Note sure why "AWS Signer" by @NetSPI isn't in the @Burp_Suite BApp Store, but it's sooooo useful when interacting with authenticated AWS endpoints (S3, API Getway, ...). And it supports temporary Cognito creds!
1
29
92
@Agarri_FR
Nicolas Grégoire
3 years
I don’t want to boast or anything, but you can get most of these tricks at once by watching my SSRF talk from 2015 😇
@omespino
Omar Espino •
3 years
#SSRF Did you know that IPv4 network standards reserve the entire 127.0.0.0/8 address block for loopback purposes? That means any packet sent to one of those 16,777,214 addresses always going to call home that means that any address 127.X.X.X = 127.0.0.1 #BugBounty #infosec
Tweet media one
8
101
366
3
18
89
@Agarri_FR
Nicolas Grégoire
7 years
Wanna practice your AWS hacking skills?
@SummitRoute
Summit Route
7 years
flAWS challenge is live! Learn about AWS security mistakes. #aws #devops #security
Tweet media one
1
121
190
0
46
90
@Agarri_FR
Nicolas Grégoire
4 years
HTTP Request Smuggling on Tinder
2
23
88
@Agarri_FR
Nicolas Grégoire
7 years
Public version of the "Nearly generic fuzzing of XML-based formats" talk given during @nullcon // cc @mozdeco
0
63
88