![Devansh (⚡, 🥷) Profile](https://pbs.twimg.com/profile_images/1879969522830176256/xyw0puLg_x96.jpg)
Devansh (⚡, 🥷)
@0xAsm0d3us
Followers
14K
Following
1K
Statuses
1K
Pwn, Security Research & Maths ⚡
mempool
Joined December 2019
RT @0xAsm0d3us: New writing/research ✒�� Fragility of The Internet: How Sacrificial Nameservers allowed potential DNS hijacking of 1.6+ mil…
0
5
0
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security. #hacking #graphql #cybersecurity #bughunting
0
5
17
@akita_zen @Blaklis_ AI created this garbage in the first place, ever since LLMs came into picture, no. of BS reports skyrocketed especially in Web3 programs. They make it seem like a Critical issue, when it is actually plain BS.
0
0
3
Scammers are actively exploiting numerous open redirects and using them to index 302 redirects on Google. They are taking advantage of this by indexing pages related to betting, casino, and gambling sites. Surprisingly, Google ends up indexing these 302 redirects. For example, if an open redirect is found on example[.]com, scammers can index example[.]com/redir?url= https://malicious[.]com, and Google will display the title of malicious[.]com under the URL of example[.]com. It’s a reminder that open redirects can be a serious issue that needs fixing. All the sophisticated security controls in the world won’t matter much if scammers can exploit something as simple as this.
1
0
14
Horrors of DNS: A Tale of 1800 potential domain takeovers due to mistyped NS I analyzed all the root domain names across 1000+ TLDs and discovered that there are around 1800+ domain names which are using mistyped NS (".ne" vs ".net"). This directly puts these domains at the risk of being hijacked. The study was inspired by a real-world incident involving MasterCard, where a typo in their DNS configuration could have been exploited by malicious actors. Read my full research here:
1
3
29
A neat trick for bypassing WAF/filters while testing for OS command injection vulnerabilities. Use shell globbing / wildcard expansion. Here is an example `cat /e*c/p*s*d` is equivalent to `cat /etc/passwd`. But how? Before cat runs, the shell expands the glob pattern /e*c/p*s*d to match actual files and directories in the filesystem. `/e*c`: The shell interprets this as "any path starting with /e, followed by zero or more characters (*), ending with c." `/p*s*d`: This matches a path or file name starting with p, followed by zero or more characters (*), then s, then zero or more characters (*), then d #bugbountytips #hacking
5
50
242
@nav1n0x If the server is deemed to be vulnerable, but a WAF is present: `../../../../../../e*c/p*s*d{{`
0
10
105
At HackerOne, we have already been doing this for years. Many of our triagers have prior experience in bug hunting (some of them are top hackers in several programs) and with years of expertise in the field.
In fact, prior bug hunting experience is a major plus for triage-related roles. While certifications are not mandatory, they are certainly a plus.
If you're an accomplished bug hunter interested in triaging, head over to HackerOne Careers and apply!
0
0
7
Time of check to time of use (TOCTOU) Attacks in GitHub workflows: One of the lesser known evils, occurs when a malicious actor submits a seemingly harmless pull request, waits for approval, and then updates the pull request with malicious code before the workflow execution.
Happens because the workflow uses a mutable reference (e.g., branch name) instead of an immutable one (e.g., commit SHA). Can occur with pull_request_target and issue_comment triggers.
How to fix?
Use an immutable reference (e.g., commit SHA) instead of a mutable one (e.g., branch name)
1
0
9