BrunoModificato Profile Banner
BrunoZero Profile
BrunoZero

@BrunoModificato

Followers
2K
Following
2K
Media
61
Statuses
430

CTFer for: @Water_Paddler / Security auditor @osec_io my writeups: https://t.co/XurIhbWdj7 24y

Joined December 2016
Don't wanna be here? Send us removal request.
@osec_io
OtterSec
1 month
Our research team achieved client RCE on Minecraft Bedrock Edition via a heap overflow to bypass ASLR and sidestep CFG. Writeup to come.
61
287
3K
@BrunoModificato
BrunoZero
2 months
New research, I did found many wallets /web 3 products not taking in consideration the difference between desktop env and mobile env leading to high severity issues.
@osec_io
OtterSec
2 months
NEW: OAuth misconfigurations show how common dev settings can lead to account takeovers. Our second deep dive breaks down real cases where overlooking differences between desktop and mobile environments left SDKs, exchanges, and wallets open to exploits. https://t.co/QWABEOXcSU
0
0
5
@osec_io
OtterSec
2 months
NEW: OAuth misconfigurations show how common dev settings can lead to account takeovers. Our second deep dive breaks down real cases where overlooking differences between desktop and mobile environments left SDKs, exchanges, and wallets open to exploits. https://t.co/QWABEOXcSU
Tweet card summary image
osec.io
OAuth misconfigurations show how common dev settings can lead to account takeovers. Explore real cases where failing to account for differences between desktop and mobile environments left SDKs,...
2
17
72
@osec_io
OtterSec
3 months
NEW: The recent supply-chain attack on NPM exposed a fundamental vulnerability in the open-source ecosystem and the risks that lurk within our dependencies. We break down how the malware worked and practical defenses every dev should know ↓ https://t.co/ZeqAkFR2jo
Tweet card summary image
osec.io
The recent supply-chain attack on NPM showed how easily trusted dependencies can become delivery vectors for malware. Learn how the attack worked and practical defenses developers can implement to...
2
9
38
@MetaMask
MetaMask.eth 🦊
4 months
As a MetaMask user, you do not need to be scared of the supply chain attack that took place earlier today. MetaMask has multiple layers of defense to protect our products and users: - Basic Security: We lock our versions, don't push directly to main, have manual and automated
517
1K
7K
@osec_io
OtterSec
4 months
NEW: Proof of Reserves you can verify yourself. We teamed up with @Backpack to build PoRv2, a zero-knowledge system for fast, transparent solvency checks. More on how we designed it ↓ https://t.co/dfyVlrceRW
Tweet card summary image
osec.io
Here, we explore zk-proofs, Merkle trees, and our new open-source implementation, PoRv2. Our proof-of-reserve enables users to verify exchange liabilities without relying on external auditors,...
23
26
142
@BrunoModificato
BrunoZero
6 months
Yay, got a new bounty #bugbountytips
2
3
86
@BrunoModificato
BrunoZero
6 months
Happy to talk there :)
@BugBountyDEFCON
Bug Bounty Village
6 months
We’re excited to announce that Bruno Halltari (@BrunoModificato) will be speaking at the Bug Bounty Village at DEF CON 33! Stay tuned for more details on their talk, you won’t want to miss it. #BugBounty #DEFCON #BBV #BugBountyVillage
6
6
38
@BrunoModificato
BrunoZero
6 months
I hope the AI hype ends soon: :'(. The quality of infosec reports and write-ups has been declining so much because of AI slop
2
1
21
@BrunoModificato
BrunoZero
8 months
Just completed this yesterday, it was fun with some cool tricks! It's been a while since I did a challenge, but I loved it. Thanks @joaxcar for the challenge
@intigriti
Intigriti
8 months
⏰ It's CHALLENGE O'CLOCK! πŸ‘‰ Find the FLAG before Friday the 16th of May πŸ‘‰ Win €400 in SWAG prizes πŸ‘‰ We'll release a tip for every 50 likes on this tweet Thanks @joaxcar for the challenge πŸ‘‡ https://t.co/BSNkoC9oN3
0
0
4
@BrunoModificato
BrunoZero
10 months
New research 🫑
@osec_io
OtterSec
10 months
NEW: A few months ago, we uncovered an authentication bypass in Web3Auth that could have led to full account takeover. In this deep dive, we break down how we found the issue and expose other authentication misconfigurations lurking in Web3. https://t.co/stjqbwuYsb
0
1
16
@osec_io
OtterSec
10 months
NEW: A few months ago, we uncovered an authentication bypass in Web3Auth that could have led to full account takeover. In this deep dive, we break down how we found the issue and expose other authentication misconfigurations lurking in Web3. https://t.co/stjqbwuYsb
4
36
118
@BrunoModificato
BrunoZero
10 months
Metamask team has some js chads
@naugtur
Naugtur πŸ’”πŸ‡ΊπŸ‡¦
11 months
These folks are fenomenal. It was a privilege to work with them!
0
0
3
@osec_io
OtterSec
11 months
We just finished an audit for Lavamoat webpack plugin and found an interesting behaviour related to how the URL costruct() was handled. Here's the details πŸ‘‡
1
5
32
@BrunoModificato
BrunoZero
11 months
If you like our research "Supply Chain Attacks: A New Era" please vote it :D. there is another article where I was involved " Zoom Session Takeover - Cookie Tossing Payloads" if you like that too pls feel free to vote it XD
@albinowax
James Kettle
11 months
Voting is now live for the Top Ten (New) Web Hacking Techniques of 2024! Browse the nominations & cast your votes here:
0
0
18
@BrunoModificato
BrunoZero
1 year
I have so much fear every time I have to explain to a triager DOS via Cache Poison with some non conventional way.... pray for me πŸ’€
0
0
13
@hackmdio
HackMD
1 year
our new look is here 🎨 we're ushering in the next chapter of HackMD with an updated logo, bold colors, and a new site. read more in our announcement below or check it out for yourself at https://t.co/07CTDhCcVt https://t.co/pF0EHigZJc
Tweet card summary image
hackmd.io
Check out HackMD's revamped look! After months of hard work and creativity, we are proud to unveil a fresh, modern look that reflects our growth and vision for the future.
12
36
143
@BrunoModificato
BrunoZero
1 year
Las Vegas is a city where everyone begs for tips even for doing something that requires 0 effort, not sure if it's an american thing or just Las Vegas
@_Nobodyisnobody
Nobody Isnobody
1 year
@josephfcox Defcon attendees are not the "ideal las vegas clients", that spend a lot at games and walk drunk like zombies all days getting scammed all over their way.. this was my 3rd Defcon, and got to the conclusion: Vegas is too hot, too expensive, fake,generally hostile to average hacker
0
0
6
@BrunoModificato
BrunoZero
1 year
Is it even possible to learn swiss german
0
0
4
@BrunoModificato
BrunoZero
2 years
New job research : 1) Check how Lavamoat can protect someone from supply chain attacks 2) A bypass on lavapack And some other fun stuff :)
@osec_io
OtterSec
2 years
NEW: Supply chain attacks are increasing in popularity in Web3. Lavamoat has emerged as a robust defense mechanism - but it’s not perfect. This blog spills the beans on some sneaky bypasses, and show how tricky it is to lock down JavaScript ecosystems. https://t.co/6THEVbd285
0
8
24