Cyber_indaboski Profile Banner
Cyber indaboski Profile
Cyber indaboski

@Cyber_indaboski

Followers
1K
Following
48K
Media
1K
Statuses
5K

Web Application Security 🌐 | Bug Bounty Hunter | Offensive Security, VAPT, Network Security | Dedicated fortifying digital defenses 🛡️🔍

Lagos, Nigeria
Joined November 2021
Don't wanna be here? Send us removal request.
@Cyber_indaboski
Cyber indaboski
8 months
As a web penetration tester, I utilized my skills to exploit vulnerabilities on the FastFood-Hacking website, successfully identifying and exploiting Open Redirect and Local File Inclusion (LFI) vulnerabilities.@ireteeh @jay_hunts @akintunero @cyb3rf034r3ss @RedHatPentester
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
11
65
@Cyber_indaboski
Cyber indaboski
9 hours
✅ 03:45:37 hrs manual hunting .✅ 00:00:00 hrs Learning.Vulnerabilities reported:.CSRF ✅.PII disclosure✅. Onward to the next challenge. 🐞
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
0
0
@Cyber_indaboski
Cyber indaboski
3 days
RT @ChelseaFC: CHAMPIONS OF THE WORLD.
Tweet media one
0
48K
0
@Cyber_indaboski
Cyber indaboski
6 days
RT @damnGruz: bro will replace AI
0
654
0
@Cyber_indaboski
Cyber indaboski
6 days
✅ 03:45:37 hrs manual hunting .✅ 02:23:26 hrs Learning.Vulnerability in search:. Cross site scripting (xss) ✅.CSRF .❌ Bug reported.#xss. Onward to the next challenge. 🐞.@ireteeh @40sp3l @Dghost_Ninja @RedHatPentester @h4ruk7
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
1
8
@Cyber_indaboski
Cyber indaboski
6 days
Good night 😣😫
Tweet media one
0
0
1
@Cyber_indaboski
Cyber indaboski
6 days
It's time to learn from the day 🤓
Tweet media one
0
0
4
@Cyber_indaboski
Cyber indaboski
10 days
RT @mrR0bust: Video on how I solved the @PortSwigger Web Security Academy Lab: Exploiting HTTP REQUEST SMUGGLING to perform web cache poiso….
0
1
0
@Cyber_indaboski
Cyber indaboski
10 days
RT @commando_skiipz: Vulnerable Bank is Now Live! 🚀. I'm excited to announce that VulnBank is officially live and accessible at https://t.c….
0
135
0
@Cyber_indaboski
Cyber indaboski
12 days
0
0
3
@Cyber_indaboski
Cyber indaboski
12 days
RT @mrR0bust: Solved an Expert Lab on @PortSwigger by exploiting #HTTP request smuggling to perform web cache poisoning. It is one thing….
0
4
0
@Cyber_indaboski
Cyber indaboski
14 days
RT @asher_kine: always seize the good weather. ❤️
0
14K
0
@Cyber_indaboski
Cyber indaboski
14 days
ready-to-test CSRF POC HTML exploit ✅
Tweet media one
0
0
2
@Cyber_indaboski
Cyber indaboski
14 days
CSRF where token is tied to non-session cookies 🍪.New video tomorrow ✅
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
0
0
@Cyber_indaboski
Cyber indaboski
14 days
I’m currently learning CSRF. What vulnerability are you working on?
Tweet media one
3
0
22
@Cyber_indaboski
Cyber indaboski
15 days
When you see this logo, what comes to your mind?
Tweet media one
0
0
1
@Cyber_indaboski
Cyber indaboski
15 days
RT @Dghost_Ninja: Guys! Finally done with the tool. It's an API discovery tool that intercepts, crawls and records API endpoints as you man….
0
23
0
@Cyber_indaboski
Cyber indaboski
15 days
👀
Tweet media one
1
0
0
@Cyber_indaboski
Cyber indaboski
16 days
@Cyber_indaboski
Cyber indaboski
16 days
Today, I learned about CSRF . The lab’s email change functionality is vulnerable to CSRF. It uses tokens to try to prevent CSRF attacks, but the tokens aren’t integrated into the site’s session handling system. @ireteeh.@40sp3 @RedHatPentester @Dghost_Ninja @elormkdaniel @h4ruk7
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
2
6
@Cyber_indaboski
Cyber indaboski
16 days
I just dropped a practical demo on exploiting CSRF when tokens aren’t tied to user sessions. 👇 Comment, share, and follow me on YouTube for more real-world web exploitation content. #CyberSecurity #CSRF #BugBounty #WebHacking.
0
0
0
@Cyber_indaboski
Cyber indaboski
16 days
The request was accepted, confirming that the token was not tied to the session. 4️⃣ I created and hosted a proof-of-concept exploit on my exploit server, which successfully changed the victim’s email address when they visited the page while logged in.
Tweet media one
Tweet media two
Tweet media three
0
0
0