
Rodolfo Assis
@RodoAssis
Followers
10K
Following
3K
Media
529
Statuses
3K
That #XSS and #WAF #bypass guy. @BRuteLogic @KN0X55
Brazil š§š·
Joined March 2018
I don't think that watching/reading #hacking tutorials and collecting BB tips in Twitter or any other social media will make you UNDERSTAND what you are doing and why that happens. Build a solid foundation with PROGRAMMING, NETWORKING, PROTOCOLS and OPERATING SYSTEMS first.
16
65
422
RT @RodoAssis: Hey bug hunter! . Do you have a WAF or any other filter in your way?. Let's COLLABORATE! š¤©. Any bug, 50/50 just DM me with dā¦.
0
1
0
Hey bug hunter! . Do you have a WAF or any other filter in your way?. Let's COLLABORATE! š¤©. Any bug, 50/50 just DM me with details. #hack2learn
0
1
10
RT @KN0X55: We just published our 1st blog post! . We hope to be just the beginning of everything #XSS related we know. Check it out! šā¦.
knoxss.pro
Finding XSS vulnerable targets is not an easy task when doing Bug Bounties but these thoughts will help you.
0
4
0
Why this is important?. Unless you test every entry point w/ something like alert(1) exactly that way, no quotes, nothing, you won't be able to spot eval() like scenarios w/ a regular #XSS vector like <Img/Src/OnError=alert(1)>. Unless you read all the JS source code, of course.
A DOM-Based #XSS Polyglot. 1;/*'"><Img/Src/OnError=/**/confirm(1)//>. If your input happens to end up in the DOM via innerHTML or eval(), it works for both cases. PoCs below. innerHTML: eval():
0
1
4
RT @RodoAssis: Between white and black, there's a lot of grey. #Hacking . That's something you learn in LIFE itself. #hack2learn
https://t.ā¦.
0
2
0
Between white and black, there's a lot of grey. #Hacking . That's something you learn in LIFE itself. #hack2learn
0
2
10
Not only progress, regression. @sucurisecurity @sucurilabs REPLACED my blog post where I define #XSS w/ 2 main types (server/client side) and their 2 subtypes (reflected/stored) for one with the (wrong) classic reflected/stored/dom style. Here: Come on.
1
2
27