Blaklis Profile
Blaklis

@Blaklis_

Followers
12K
Following
638
Media
71
Statuses
3K

Security researcher - my researchs will be on https://t.co/2PnyCvqAIm Inactive X account.

Joined November 2017
Don't wanna be here? Send us removal request.
@Blaklis_
Blaklis
3 months
Around a week ago, I decided to step back a bit into the shadows, and reduce drastically my presence in the bug bounty community, especially on Discord and X. That story confirmed that's definitely the good move. Those were my last tweets for a while. Starting today, I'll no
0
0
89
@Blaklis_
Blaklis
4 days
Release is out : https://t.co/uGEKxm503h This patches a pre-auth RCE and a customer ATO that I found a few days ago on Adobe Commerce and Magento. If you're using it, patch asap! This wouldn't be surprising to see TA using them in a few hours or days, at most. #magento
2
5
74
@Blaklis_
Blaklis
4 days
Exceptionnally back on X for that. If you are a Magento or Adobe Commerce user, patch as soon as possible - the patch of my bug will be released imminently. This has one of the most severe impact possible, and is easy to trigger. Expect attacks, very soon. #magento #ecommerce
@sansecio
Sansec
5 days
Urgent: Adobe will drop critical patch tomorrow, outside of regular patch cycle. Fixes SessionReaper attack, affects Adobe Commerce / Magento 2.3.1+. Concept patch accidentally leaked. https://t.co/Yh8yL4e3s5
2
5
26
@Blaklis_
Blaklis
3 months
Hey the community! I feel the need to react to https://t.co/8vcqTEJpTu, as it targets me specifically and is doing a clear defamation there. I guess it's useless to say that the claims of me telling that I'll block people based on the fact that they're muslim is a complete lie,
Tweet media one
Tweet media two
30
18
176
@DoomerOutrun
doomerhunter (Victor Poucheret)
3 months
Hit some huge bounties collaborating with some of the top French bug hunters @0xLupin, Snorlhax, @Blaklis_ accross campaigns and the H1-6102 LHE. Never had so many large rewards in a small timeframe 🀯 Most fun I had in a long time !
Tweet media one
18
20
403
@plopz0r
Alain M.
3 months
Just finished my talk at #securityfest, you can find all the details in my latest blog post:
1
16
26
@Blaklis_
Blaklis
3 months
Yay, we were awarded a $50,000 bounty on @Hacker0x01 with @DoomerOutrun and Snorlhax! https://t.co/NEdO2VCs1P #TogetherWeHitHarder #bugbounty
Tweet card summary image
hackerone.com
- https://www.blakl.is
35
22
549
@infinitelogins
Harley Kimball
4 months
I've been working on something behind the scenes for the past couple of months, and I'm finally ready to share it. Disclosed. A curated newsletter about the bug bounty world. https://t.co/5RDRrVMzVf Over the last four weeks, I've been quietly publishing weekly issues and
Tweet card summary image
getdisclosed.com
The bug bounty world, curated.
6
20
89
@Blaklis_
Blaklis
4 months
Another good one! :) Yay, I was awarded a $8,333 bounty on @Hacker0x01, on a $25,000 bounty in collab with Snorlhax & @DoomerOutrun πŸ’ͺ! https://t.co/NEdO2VCs1P #bugbounty #TogetherWeHitHarder
Tweet card summary image
hackerone.com
- https://www.blakl.is
5
8
264
@infinitelogins
Harley Kimball
4 months
Built some automation and a directory for aggregating bug bounty profiles. Adding your profile isn't open to the public yet but let me know what you think. https://t.co/vxiAgjwlIF #bugbounty
Tweet card summary image
disclosedonline.com
The bug bounty world, unified. Public researcher profiles with data from HackerOne, Bugcrowd, GitHub, and more.
13
23
151
@Blaklis_
Blaklis
4 months
In a few days, I was awarded $20'000 in bounties on @Hacker0x01, and a nice CFH 10'000 (~$12'000) bounty on @swisscom_csirt ! Nice way to slowly get back at it hehe :) #TogetherWeHitHarder #bugbounty #SwisscomBugBounty
11
7
264
@Blaklis_
Blaklis
4 months
The last bits of it took me a bit of time, as I took some very long holidays, but I'm now part of the 10k rep club πŸ‘€ #BugBounty
Tweet media one
12
1
194
@Blaklis_
Blaklis
4 months
My french team, for the world cup, and in collaboration with my wife, printed me a hoodie with a redacted payload on it. That bug was super fun, but quite hard to exploit! If encoded words, RFC2047 and so on are strange words to you, @garethheyes presented at the same time their
Tweet media one
Tweet media two
@BugBountyDEFCON
Bug Bounty Village
4 months
@Blaklis_ squeezed a pre-auth RCE payload into exactly 64 chars using MIME-encoded magic, a short web root, and some RFC sorcery. β€œIt works. Don’t ask me why. I even printed it on a T-shirt.” Full talk β†’ https://t.co/0v9Jwy2PPn #BugBounty #DEFCON #AppSec #BBV
9
10
136
@Blaklis_
Blaklis
4 months
... and we dropped 2 new vulnerabilities, bypassing the emergency patch. Might have been a threat actor dream I guess :p #BugBounty
@BugBountyDEFCON
Bug Bounty Village
4 months
A threat actor dropped a pre-auth RCE via SSTI in a popular PHP CMS. @Blaklis_ watched the emergency patch drop… and reversed it. Full talk β†’ https://t.co/0v9Jwy2PPn #BugBounty #DEFCON #RCE #SSTI #AppSec #BBV
1
3
38
@Blaklis_
Blaklis
4 months
Because $z->xinclude(false) doesn't prevent XInclude directives to be parsed - it actively evaluates xinclude directives :p. A few at-first-sight useless bugs that chained well to get something critical! @swisscom_csirt even added a bonus for it, for the exploit coolness! Have a
@BugBountyDEFCON
Bug Bounty Village
4 months
@Blaklis_ chained XML injection β†’ XInclude β†’ XPath injection to exfiltrate a session token byte by byte. Got admin, then Remote Code Execution. Absolute win. Full talk β†’ https://t.co/0v9Jwy2PPn #BugBounty #DEFCON #RCE #XXE #AppSec #BBV
1
7
72
@Blaklis_
Blaklis
4 months
Oops, everyone is admin! #bugbounty
@BugBountyDEFCON
Bug Bounty Village
4 months
@Blaklis_ found a way to inject a serialized object that deleted the .htaccess file protecting the admin panel. One request later: no auth required. Everyone's an admin. Full talk β†’ https://t.co/0v9Jwy2PPn #BugBounty #DEFCON #AppSec #BugBountyVillage
0
3
62
@Blaklis_
Blaklis
4 months
Or maybe this one was the easiest? :p #bugbounty
@BugBountyDEFCON
Bug Bounty Village
4 months
@Blaklis_ went for a coffee break mid-payment test… came back to free money in his account. Turns out, if you let the transaction timeout, it gets marked as successful. No joke. Bug paid $3,000 β€” best coffee break ever. Full talk β†’ https://t.co/0v9Jwy2PPn #BugBounty #DEFCON
4
5
50
@Blaklis_
Blaklis
4 months
Probably one of the easiest bugs in my career :) #BugBounty
@BugBountyDEFCON
Bug Bounty Village
4 months
@Blaklis_ found a bug where just canceling the login process led to full access. No SMS code, no exploit β€” just hit cancel. Logged in anyway. They paid $8,000 for it. Full talk β†’ https://t.co/0v9Jwy2PPn #BugBounty #AuthBypass #AppSec #BugBountyVillage #DEFCON
3
10
136
@BugBountyDEFCON
Bug Bounty Village
4 months
Daniel Le Gall (@Blaklis_) shares a ride through real-world bug bounty wins β€” from SMS token leaks and XPath exfiltration to MIME header RCEs and logic flaws that pay on coffee breaks. $2M+ earned, 15+ years of hacking. Full talk β†’ https://t.co/0v9Jwy2PPn #BugBounty #DEFCON
Tweet media one
0
15
92