Louis Nyffenegger
@snyff
Followers
20K
Following
23K
Media
1K
Statuses
12K
Founder/CEO/Trainer/Researcher/CVE archeologist @PentesterLab. Security engineer. Bugs are my own, not of my employer...
โ
Joined December 2011
As an engineer, I โค๏ธ clever engineering. Ruby on Rails relies on signed sessions (AES GCM). They are secure, but there is a catch: you cannot invalidate them early. You have to wait for expiry. Workarounds exist, like caching sessions you want to kill, but nothing universal.
2
4
36
Articles worth reading discovered last week: ๐ง https://t.co/kksAYewMLg ๐ค https://t.co/1DwIn3xxwX ๐งฑ https://t.co/fVqeXL4u9l ๐ต๏ธโโ๏ธ https://t.co/TMsDH6gnLE ๐ฅ https://t.co/avk8jOb3gJ ๐
yeswehack.com
Learn syntax confusion techniques using filename*, file://host:port, and PHP parse_url to bypass filters, poison caches and escalate SSRF.
0
14
86
Heading to @CHCon_nz next week! Come say hi at the @PentesterLab booth ๐ First people with an active PentesterLab sub get a free t-shirt ๐ First in, first served!
0
3
19
Youโre not the customer, youโre the data stream. Every โfreeโ message, file, and login you create is a micro-investment, just not in your own business. Itโs funding someone elseโs data vault.
1
4
14
The TIOBE Index is a psy-op operation from Python lovers. ๐
0
0
1
I had a great time at BSides Perth this week-end! My talk went well, people even laughed at some of my jokes, and the entire room unanimously agreed that Ruby is the best programming language. What a success!
1
0
6
TIL: you can get a CVE if an application accepts passwords that are too long... https://t.co/qPdnLctTg9 (in before, I know about bcrypt truncation)
github.com
## Summary Strapi's password hashing implementation using bcryptjs lacks maximum password length validation. Since bcryptjs truncates passwords exceeding 72 bytes, this creates potential vul...
1
3
17
Here is a great platform you can learn & practice "All ABout Bug Bounty From Recon To Exploitation" https://t.co/N27mYwh0yO
#Bug_Bounty
0
6
51
๐ Effective Note-Keeping for Web Security Code Reviews Blog: https://t.co/37f3azi439 author: @snyff
#infosec
0
24
86
In 2003 I learned through the research of Damasio that there is no such thing as a decision made without emotion. Amazes me how many people still say "control the emotion" - a logical fallacy. In 2008, I learned that the brain is a prediction machine. In 2015 , I learned that
5
3
68
Wanna up your Go secure code review game? Spot timing attacks, ZIP slip, hard-coded secrets & weak randomness! All with code examples. ๐ Read: https://t.co/yKhTO5L2t0
#AppSec #Go #Cybersecurity
0
3
24
@0xMstar OSCP first, but then Iโd go for CWEE instead (Gold Annual from HTB). If you want specific appsec - https://t.co/DaEldybakp for code review, and n-day/research @steventseeley โs full Stack course (he wrote the OG modern OSWE course material from memory)
0
3
12
Most Important Subdomains - development - test - production You might encounter applications that companies shouldn't open to the internet. If you're lucky, you could make big profits. Thanks legend @snyff
#EthicalHacking #BugBounty
0
2
4
Food $400 Data $100 Rent $850 H100 $36,000 Utility $150 Can someone who is good with money help me budget this? My family is dying.
0
0
3
Also from white-hat Louis:
github.com
Add warning for crypto_one_time_aead/7 about tag length. Also clarify docs for crypto_one_time_aead/6.
0
0
3
White-hat louis strikes again:
github.com
Hi team, I found a potential security improvement in Reforge::Encryption. What is the best way to report/share it?
1
1
5
Wait vercel is a website thingy? I thought it was an insult for frontend devs like incel
85
180
5K
In @FortuneMagazineโs latest robotics commentary, OpenMind Founder @JanLiphardt explores a key question: "How do you trust a robot you've never met?" Only through transparent, enforceable, and human-first standards can we truly build trust with robots. (Full Article Below)
67
70
455
As one of my teachers used to say: eval() is evil...
1
0
8
Speaking at @BSidesPer soon (Only there on Sunday but I'm bringing swag). Iโll present the same talk (slightly different forms) at @kawaiiconNZ and Hack The Hills! The main idea: Most people donโt look at the actual code changes when a CVE drops.
1
0
9