
titon
@_titon_
Followers
474
Following
702
Media
27
Statuses
828
Yo @CheckPointSW, 1998 called and they would like their directory traversal vulnerability back ! #CVE-2024-24919.
0
0
2
RT @d0tslash: So far @lemonodor has the trophy for best find. Pilots & Jets on tarmac at "31.92458, 117.66220" CN-0147 Feidong Air Base a….
0
5
0
RT @timolongin: Just dropped a blog post about SMTP smuggling, a novel technique for e-mail spoofing!.
0
86
0
Good write up !.
F5 BIGIP is vulnerable to a smuggling request vulnerability that an attacker can exploit to achieve unauthorized RCE. Our vulnerability research team responsibly disclose this to F5, which released a hotfix today. #vulnerabilityresearch #f5 #cve.
0
0
3
RT @albinowax: One cool thing I didn't mention in the presentation is that you can also use the single-packet attack via Burp Repeater, eve….
0
10
0
RT @PortSwiggerRes: We've just published 'Smashing the state machine: the true potential of web race conditions' by @albinowax! Dive in to….
portswigger.net
For too long, web race condition attacks have focused on a tiny handful of scenarios. Their true potential has been masked thanks to tricky workflows, missing tooling, and simple network jitter hiding
0
223
0
PurpleTeam opsec gone wrong. 🙃
Kicked off our Black Hat training today! Going to have a blast over the next four days! 🎉 #BHUSA @Ben0xA @HackingDave @BlackHatEvents
0
0
2
Mad props to @_cablethief, @TH3_GOAT_FARM3R, @singe (and the rest of the @sensepost crew) for giving an awesome 4 days Wi-Fi hacking class full of realistic labs using nothing but cloud instances ! 🤯.
2
3
14
RT @infosec_au: We've analyzed the patch diffs for CVE-2023-3519 (Citrix Pre-Auth RCE) and have published our findings so far on our blog p….
0
78
0