Sign in with Twitter

Username:

Security enthusiast that loves playing CTFs and hunting for bugs in the wild. https://t.co/PWnf6Ot4jx Vice-captain of @justcatthefish team.

98 Following   2,438 Followers   469 Tweets

Joined Twitter 1/30/19


Students! Need help getting to #hackersummercamp ? If you are interested in #infosec @DianaInitiativehttps://t.co/LHmlaNf2vf
Retweeted by terjanq @rhyselsmore And xss on user-content-cdn domain. @rhyselsmore open redirect in URL shorteners
2/23
2020
@shhnjk booo @lbherrera_
2/19
2020
@t0nk42 True, detection would be probably the same as in the algorithmic approach. Now I see what you want to achie… https://t.co/RfOLUXxWCU @t0nk42 After reading your second tweet in the thread, it actually might be falling under algorithmic behavior, whi… https://t.co/fYks2tPn9f#xsleaks as TOP2 web hacking technique of 2019! Although none of my articles were directly placed in the top 10, tw… https://t.co/9ob0Q09bHR
2/17
2020
Hey! A little bit late, but we've just released all sources to #justCTF 2019 challenges. All challenges can be now… https://t.co/vHqOO56O3e
Retweeted by terjanq
2/16
2020
@bookgin_tw @balsnctf The newest one, but it seems to be working on every chrome version I have installed. https://t.co/r3eTBjb5Wk @balsnctf 123 and 103 are indeed nginx behavior in this case too but what is more interesting is that 1XX codes wor… https://t.co/Dj82Gh4CyK
2/15
2020
@garethheyes @insertScript Another way I tried was to use Symbol syntax to produce valid JS but Symbol(1)+0 throws… https://t.co/kDjPNxpPiF @garethheyes @insertScript If we were able to use match() somehow to produce ["payload", ...] then I think we could… https://t.co/oSzmD03GsK
2/13
2020
@garethheyes Hehe, made an update that may give you some inspiration @insertScript @garethheyes https://t.co/9bsbUF39SANew blog post! We've published a technique by @SecurityMB to leak data via CSS injection in Firefox with a single i… https://t.co/ze2PN3kYUk
Retweeted by terjanq
2/12
2020
@S1r1u5_ @mozsec I fuzzed different payloads. @lbherrera_ was looking whether it was possible to execute JS inside… https://t.co/AKWNp9a05mI just got my first CVE 😍 CVE-2020-6798 Thanks, @mozsec :) https://t.co/ydlcq6uDdd @intigriti https://t.co/mko0dtVJud by @sirdarckcat is a good lecture.
2/11
2020
@insertScript @LewisArdern that's what I get also :D it's like playing a lottery. Weird stuff happens with every ea… https://t.co/Zqaa5vjNeg @LewisArdern yep, i also noticed that it doesn't render sometimes. try to refresh with cache cleared. Some doesn't… https://t.co/H8Mt8t0waNIs this normal that https://t.co/aXfphS6cZg returns that page? Seems a little off to me. 🧐 https://t.co/Pxpe3ooLk4
2/10
2020
This weekend we played #HackIMCTF and finished 🥈🙀 We also got two first 🩸 which always is appealing 😺 Congrats to… https://t.co/BuLEwJUbnq
Retweeted by terjanq @stereotype32 @__Sehun_Oh__ @bookgin_tw I was also only trying to solve by looking at the PHP code and assuming I have passed HLE xd @__Sehun_Oh__ @bookgin_tw @stereotype32 Well, congrats on the unintended solution then @stereotype32 that works reg… https://t.co/xbofwm7d4I @junorouse @stereotype32 @__Sehun_Oh__ We've seen someone suggesting that it was an old version of PHP that allowed… https://t.co/wpfX8M25Gd @stereotype32 @__Sehun_Oh__ What is strange though, is that it starts executing scripts, before the final headers a… https://t.co/KIbUH5miSl @stereotype32 @__Sehun_Oh__ It's just the protocol. All headers are in place, PHP did nothing wrong here. ~ The 10… https://t.co/HR9MjmAEDpCodeGate 2019 CSP solution. I didn't actually solve this challenge as I'm too lazy to do it. but probably the met… https://t.co/qWHyjhgqsx
Retweeted by terjanq @stereotype32 @__Sehun_Oh__ Nice trick with 1XX headers, I was looking at the chall for only 15 minutes but was on… https://t.co/yOQKSClYoa
2/9
2020
Even make them wear their outfit! aka S.W.A.G. sweet times, indeed.Bug bountiers are yet another type of influencers. Companies pay them money to keep them using their services, pref… https://t.co/U8FN1O6Upp @garethheyes The trick with <style>@import</style> is very clever! I love it. The included example will not work fo… https://t.co/TqOicvqwXu
2/7
2020
@PortSwiggerRes To be clear, I didn't invent the technique :P It was already known when I joined infosec xDChrome:<iframe name=windowplz> </iframe> <script> windowplz.alert(1) </script> Based on @terjanq's DOM Clobbering research.
Retweeted by terjanq @PortSwiggerRes Btw, this also works on Firefox, but the iframe must be on the same domain iirc. @PwnFunction @garethheyes Of course. Not only dom purify, but iframes in general are often disallowed. Though the b… https://t.co/PBHYDrQeAuGreat introduction to DOM Clobbering. What is missing though, is the trick with the <iframe> to dive down way more… https://t.co/xopjzkwKKqNice #xsleaks by @arturjanc https://t.co/iStu9YGItQ
Retweeted by terjanq
2/6
2020
Here's my write-up for #h1415’s CTF challenge! https://t.co/VQf8PDIUg5
Retweeted by terjanq @FakeUnicode @garethheyes @WebSecAcademy Yeah, the simplest one is just: location=name when setting name="javascrip… https://t.co/6FmavZowU6⚡️ New #XSS challenge "Jason Bourne" https://t.co/MMl7TWipW3 https://t.co/4dvvp4PuEK
Retweeted by terjanq
2/3
2020
@garethheyes @WebSecAcademy https://t.co/tZHUPflOqO @quanyang @garethheyes @WebSecAcademy It was for "Reflected XSS in a JavaScript URL with some characters blocked",… https://t.co/XrbeJX25VPI just got a fancy idea to create strings in #javascript without using dangerous characters 😃 Inspired by… https://t.co/tZoDipsAOQ
2/1
2020
@ngalongc, @EdOverflow, and I are starting a new security blog. In our first write-up, we will discuss the impact… https://t.co/bU8Dmghf70
Retweeted by terjanq
1/31
2020
@arturjanc @Google @lbherrera_ @sirdarckcat Truly looking forward to it! @lbherrera_ @Google @sirdarckcat Yet still was so close to the solution :( @lbherrera_ @Google @sirdarckcat That is true, we got along very quickly! ^^ @garethheyes @lbherrera_ @sirdarckcat Thank you 💜 but I still have a lot to learn :P- my first big tweet https://t.co/1LN3jkG7y4 - #funfacts I reported the vulnerability to Twitter in 7 days after cr… https://t.co/oliYVOmAfCSummarizing my first year on @Twitter - I posted 25 tweets with the reach over 10k each - I reached out to 1.5M p… https://t.co/K6LAXMfeInI wouldn't be where I am (yet) if it wasn't for Luan(@lbherrera_) who introduced me to Twitter and BugBounty, Eduar… https://t.co/lnMqNkAMyRWhat a year! 2019 was the year of my growth and success. 2121 of you clicked the follow button on my avatar🤪unbelie… https://t.co/mhVKZu3jtI
1/30
2020
@_niklasb https://t.co/l4x3tl2mF2 For more what can be done with cookies, the above deck by @filedescriptor is a good way to go @_niklasb Apart from cookies, if both pages set document.domain='https://t.co/VYGnvVyMJs' then they are treaded sam… https://t.co/lXd2X0zy1z
1/28
2020
As I have no cool new findings, lets start the year with an old IE bug - bypassing Content-Disposition: attachment… https://t.co/6gn283NBzf
Retweeted by terjanq
1/26
2020
@filedescriptor Actually not only CSRF, but a significant portion of #xsleaks as well. @nutronex https://t.co/8zeadcRffR @nutronex \u2028 and \u2029 ;)
1/25
2020
The writeup for the Ugly Website is still missing. Also, we will be releasing sources of all challenges shortly - a… https://t.co/qUMBHABhEOI started writing solutions to my challenges on #justctf quite a time ago but haven't had enough time to finish it.… https://t.co/eP8Y774dag
1/23
2020
What a start of the year. We have finished at 5th position in @1ns0mn1h4ck Teaser 2020! 😻🦈 https://t.co/enOEvWCQ9m
Retweeted by terjanq @insertScript @PwnFunction @SecurityMB Same haha. Found some cool stuff in Jquery on the way but in the end it was… https://t.co/4J5vauyNQH @PwnFunction https://t.co/LKTsXBMzrY @SecurityMB @insertScript thought you would be the first to solve hehe @insertScript @PwnFunction It was mxss xd @nutronex @disclosedh1 yes @disclosedh1 I think it was XSS not Open redirect.. the title is very confusing https://t.co/iiuRcBI2pX @PwnFunction Can't wait for a new video! :)
1/19
2020
@albinowax I see more than one ;) @PwnFunction @SecurityMB Sink? Xd
1/15
2020
𝘟𝘚𝘚-𝘈𝘶𝘥𝘪𝘵𝘰𝘳 — 𝘵𝘩𝘦 𝘱𝘳𝘰𝘵𝘦𝘤𝘵𝘰𝘳 𝘰𝘧 𝘶𝘯𝘱𝘳𝘰𝘵𝘦𝘤𝘵𝘦𝘥 𝘢𝘯𝘥 𝘵𝘩𝘦 𝘥𝘦𝘤𝘦𝘪𝘷𝘦𝘳 𝘰𝘧 𝘱𝘳𝘰𝘵𝘦𝘤𝘵𝘦𝘥 was nominated to TOP10 hacking techniques… https://t.co/r7ghXaPK5u
1/14
2020
@Hai45765846 @kidOfArcrania @stereotype32 https://t.co/0k9dx2ouIF there should be discord invite
1/12
2020
Hah, this reminds me when I wanted to use this little trick (RGBA image, RGB with data, Alpha=0) on a CTF to hide a… https://t.co/uuUI8SIQMl
Retweeted by terjanq @PwnFunction Had a lot of fun with the challenge ^^ https://t.co/5fNwY3SoFo @PwnFunction It's beautiful 💜Yo hackers! I've built a small website that has some #XSS challenges. 🔗 https://t.co/EP3HnJBCvm The main challen… https://t.co/c14eVnrD36
Retweeted by terjanq
1/11
2020
[NEW] #XSS Challenge https://t.co/kRGBF1M4qq DM me if you solved it :) Have fun! * Solutions, 1 week from now.
Retweeted by terjanq @xdavidhu @sirdarckcat There is something in these stats that makes me want to hide mine as well. On one hand, red… https://t.co/nWwh8IXl8F
1/10
2020
https://t.co/Sdfm4Fbrtl
Retweeted by terjanq
1/9
2020
@pawel_lukasik And lead to great researches! @bookgin_tw @_r_netsec @r_netsec Weird indeed. The article was quickly removed (had only 50 views on medium on the… https://t.co/13xYxo6nC8Turns out that my solution was pretty unintended. I updated the article with the intended solution and also linked… https://t.co/7yhDET3h1N @kidOfArcrania CC @stereotype32 https://t.co/e5tC7wZGAq @S1r1u5_ That was the intended way :) @stereotype32 The column name disappeared from DB, haha. At least that's what author said. Looks that table is auto… https://t.co/RLUYPNGn28
1/8
2020
@ArthurSaftnes When you read the tweet about a person that just is the one tweet away 😂 https://t.co/ae8QSoFZKS @sirdarckcat Not consider myself as a full-time bug bounty, but the signal made me quit searching for bugs in XYZ c… https://t.co/1k9JbDlGHi @ricardo_iramar @shhnjk @sirdarckcat to charities!How do I get removed that tweet? I can't believe that a tweet without a content went viral! Are people literally d… https://t.co/BrReBUbVx7#ePrint SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust: G Leu… https://t.co/dcURcdhZf2
Retweeted by terjanq @_r_netsec https://t.co/Vi5qFBoxEt Updated linkFor the sake of exercising, I looked up some web challenges in a #tetctf and noticed a cool SQLi one "Secure Syste… https://t.co/mBIDV9IOOv @_r_netsec I am very sorry guys, the CTF that I was blogging about didn't finish - they set a wrong time on CTFtime… https://t.co/tVIZc0AvfBOupsie, comes out #tectf has set the wrong end time on ctftime :D Please unseen the writeup I just posted, will be posted back tomorrow!
1/7
2020
The top 10 web hacking techniques of 2019 has some new contenders, thanks to community nominations. Keep them comin… https://t.co/V9OyQKykJy
Retweeted by terjanq @RenwaX23 Didn't know about that behaviour, good to know ;) https://t.co/3FfkQlTTtD
1/6
2020
I made a small CSRF challenge https://t.co/6yizLAVCnr Goal: Change username to "pwned" Rules: 1.Only Chrome 2.Us… https://t.co/rKIhE90MhR
Retweeted by terjanq
1/5
2020
An amazingly well written description of the upcoming SameSite cookie enforcement in Chrome 80. If your org makes… https://t.co/lApQxqHCxj
Retweeted by terjanq
1/4
2020
@bookgin_tw @stereotype32 We weren't xd Just got a straight forward solution
1/2
2020
@sirdarckcat @LiveOverflow @zseano @ITSecurityguard @zerocopter @intigriti @yeswehack @YogoshaOfficial @Testbirdshttps://t.co/qrbp6bTtYf @stereotype32 I didn't see any writeups yet I mean, there are none on ctftime.
1/1
2020

0