
Blaklis
@Blaklis_
Followers
12K
Following
638
Media
71
Statuses
3K
Security researcher - my researchs will be on https://t.co/2PnyCvqAIm Inactive X account.
Joined November 2017
Around a week ago, I decided to step back a bit into the shadows, and reduce drastically my presence in the bug bounty community, especially on Discord and X. That story confirmed that's definitely the good move. Those were my last tweets for a while. Starting today, I'll no
0
0
89
Release is out : https://t.co/uGEKxm503h This patches a pre-auth RCE and a customer ATO that I found a few days ago on Adobe Commerce and Magento. If you're using it, patch asap! This wouldn't be surprising to see TA using them in a few hours or days, at most. #magento
2
5
74
Exceptionnally back on X for that. If you are a Magento or Adobe Commerce user, patch as soon as possible - the patch of my bug will be released imminently. This has one of the most severe impact possible, and is easy to trigger. Expect attacks, very soon. #magento #ecommerce
Urgent: Adobe will drop critical patch tomorrow, outside of regular patch cycle. Fixes SessionReaper attack, affects Adobe Commerce / Magento 2.3.1+. Concept patch accidentally leaked. https://t.co/Yh8yL4e3s5
2
5
26
Hey the community! I feel the need to react to https://t.co/8vcqTEJpTu, as it targets me specifically and is doing a clear defamation there. I guess it's useless to say that the claims of me telling that I'll block people based on the fact that they're muslim is a complete lie,
30
18
176
Just finished my talk at #securityfest, you can find all the details in my latest blog post:
1
16
26
Yay, we were awarded a $50,000 bounty on @Hacker0x01 with @DoomerOutrun and Snorlhax! https://t.co/NEdO2VCs1P
#TogetherWeHitHarder #bugbounty
hackerone.com
- https://www.blakl.is
35
22
549
I've been working on something behind the scenes for the past couple of months, and I'm finally ready to share it. Disclosed. A curated newsletter about the bug bounty world. https://t.co/5RDRrVMzVf Over the last four weeks, I've been quietly publishing weekly issues and
getdisclosed.com
The bug bounty world, curated.
6
20
89
Another good one! :) Yay, I was awarded a $8,333 bounty on @Hacker0x01, on a $25,000 bounty in collab with Snorlhax & @DoomerOutrun πͺ! https://t.co/NEdO2VCs1P
#bugbounty #TogetherWeHitHarder
hackerone.com
- https://www.blakl.is
5
8
264
Built some automation and a directory for aggregating bug bounty profiles. Adding your profile isn't open to the public yet but let me know what you think. https://t.co/vxiAgjwlIF
#bugbounty
disclosedonline.com
The bug bounty world, unified. Public researcher profiles with data from HackerOne, Bugcrowd, GitHub, and more.
13
23
151
In a few days, I was awarded $20'000 in bounties on @Hacker0x01, and a nice CFH 10'000 (~$12'000) bounty on @swisscom_csirt ! Nice way to slowly get back at it hehe :) #TogetherWeHitHarder #bugbounty #SwisscomBugBounty
11
7
264
The last bits of it took me a bit of time, as I took some very long holidays, but I'm now part of the 10k rep club π #BugBounty
12
1
194
My french team, for the world cup, and in collaboration with my wife, printed me a hoodie with a redacted payload on it. That bug was super fun, but quite hard to exploit! If encoded words, RFC2047 and so on are strange words to you, @garethheyes presented at the same time their
@Blaklis_ squeezed a pre-auth RCE payload into exactly 64 chars using MIME-encoded magic, a short web root, and some RFC sorcery. βIt works. Donβt ask me why. I even printed it on a T-shirt.β Full talk β https://t.co/0v9Jwy2PPn
#BugBounty #DEFCON #AppSec #BBV
9
10
136
... and we dropped 2 new vulnerabilities, bypassing the emergency patch. Might have been a threat actor dream I guess :p #BugBounty
A threat actor dropped a pre-auth RCE via SSTI in a popular PHP CMS. @Blaklis_ watched the emergency patch dropβ¦ and reversed it. Full talk β https://t.co/0v9Jwy2PPn
#BugBounty #DEFCON #RCE #SSTI #AppSec #BBV
1
3
38
Because $z->xinclude(false) doesn't prevent XInclude directives to be parsed - it actively evaluates xinclude directives :p. A few at-first-sight useless bugs that chained well to get something critical! @swisscom_csirt even added a bonus for it, for the exploit coolness! Have a
@Blaklis_ chained XML injection β XInclude β XPath injection to exfiltrate a session token byte by byte. Got admin, then Remote Code Execution. Absolute win. Full talk β https://t.co/0v9Jwy2PPn
#BugBounty #DEFCON #RCE #XXE #AppSec #BBV
1
7
72
Oops, everyone is admin! #bugbounty
@Blaklis_ found a way to inject a serialized object that deleted the .htaccess file protecting the admin panel. One request later: no auth required. Everyone's an admin. Full talk β https://t.co/0v9Jwy2PPn
#BugBounty #DEFCON #AppSec #BugBountyVillage
0
3
62
Or maybe this one was the easiest? :p #bugbounty
@Blaklis_ went for a coffee break mid-payment testβ¦ came back to free money in his account. Turns out, if you let the transaction timeout, it gets marked as successful. No joke. Bug paid $3,000 β best coffee break ever. Full talk β https://t.co/0v9Jwy2PPn
#BugBounty #DEFCON
4
5
50
Probably one of the easiest bugs in my career :) #BugBounty
@Blaklis_ found a bug where just canceling the login process led to full access. No SMS code, no exploit β just hit cancel. Logged in anyway. They paid $8,000 for it. Full talk β https://t.co/0v9Jwy2PPn
#BugBounty #AuthBypass #AppSec #BugBountyVillage #DEFCON
3
10
136
Daniel Le Gall (@Blaklis_) shares a ride through real-world bug bounty wins β from SMS token leaks and XPath exfiltration to MIME header RCEs and logic flaws that pay on coffee breaks. $2M+ earned, 15+ years of hacking. Full talk β https://t.co/0v9Jwy2PPn
#BugBounty #DEFCON
0
15
92