Dominik Penner Profile Banner
Dominik Penner Profile
Dominik Penner

@zer0pwn

Followers
5,748
Following
1,701
Media
527
Statuses
7,058

principal security consultant @mandconsulting_ . former ssc @nccgroupinfosec . co-founder @hackerschange . security researcher in the pursuit of knowledge

Toronto, Ontario
Joined December 2011
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@zer0pwn
Dominik Penner
5 years
Being the best hacker on the planet comes at a cost.
Tweet media one
48
513
3K
@zer0pwn
Dominik Penner
9 months
lmao someone dropped a csgo xss via username, with assumed paths to rce through javascript libraries
Tweet media one
@csmoneytrade
CS.MONEY
9 months
DON'T PLAY CS2! CS2 currently has a serious vulnerability which could be used for fun or to plant harmful software on PC! Your system can be hacked in no time. This new bug works even with lobby invites, so simple idling in the game menu could be dangerous as well!
Tweet media one
103
390
3K
31
494
3K
@zer0pwn
Dominik Penner
5 months
wild stuff re: xz/liblzma backdoor
Tweet media one
15
406
2K
@zer0pwn
Dominik Penner
8 months
what isn’t mentioned here, is the heater of a diss track @realGeorgeHotz addressed to sony. only real ones remember
@todayininfosec
Today In Infosec
8 months
2011: 21-year-old George "geohot" Hotz published the PlayStation 3 root key online. This allowed owners to jailbreak the console. Sony soon sued Hotz. Settling out of court, he agreed to numerous terms, including not reverse engineering Sony products or bypassing controls.
Tweet media one
10
98
716
36
140
2K
@zer0pwn
Dominik Penner
4 years
Have a SQLi on a WordPress site? Can't crack a user or admin's hash? Just request a password reset and then dump the "user_activation_key" from wp_users. Then navigate to the URL in the second img :) #redteam #security #bugbounty #bugbountytip #mysql #sql #wordpress #exploit
Tweet media one
Tweet media two
15
239
624
@zer0pwn
Dominik Penner
4 years
Combine bash features to develop obfuscated payloads and slip past filters/detection. Valid "cat /etc/passwd": {\c''\a""t,/e''*?/?a?s??} Combines: - Brace expansion - String manipulation - Wildcards #bugbountytips #bugbountytip #redteam #waf #obfuscation #security #linux
Tweet media one
5
117
291
@zer0pwn
Dominik Penner
7 months
#MonikerLink (cve-2024-21413) really said
Tweet media one
2
23
285
@zer0pwn
Dominik Penner
4 years
Using proxychains, you can proxy all traffic from an application on linux. I often use this to forward traffic thru Burpsuite to see what the application is doing. #bugbounty #bugbountytip #bugbountytips #security #redteam
4
82
279
@zer0pwn
Dominik Penner
6 years
most java web apps allow bypassing common LFI filtering rules by doing the following: hxxp://domain.tld/page.jsp?include=..;/..;/sensitive.txt #bugbounty #bugbountytip #webapp #j2ee #java #tomcat
4
124
266
@zer0pwn
Dominik Penner
5 years
Sorry for flex but... 😎
Tweet media one
19
26
234
@zer0pwn
Dominik Penner
5 years
CVE-2019-12828 Origin RCE analysis and proof of concept. #security #bounty #bugbounty #redteam #rce #qt #bugbountytips
5
74
208
@zer0pwn
Dominik Penner
5 years
You vs the guy she told you not to worry about. cc @_MG_
Tweet media one
Tweet media two
7
23
158
@zer0pwn
Dominik Penner
5 years
Hey @McDonaldsCanada , I've tried getting in contact with your team with no success. Over the past few months there have been numerous complaints from your customers about their funds going missing. If you guys would remediate this blaring SQLi on your website it might help.
Tweet media one
9
47
150
@zer0pwn
Dominik Penner
9 months
@sshell_ damn lorenzo popped tf off
1
0
155
@zer0pwn
Dominik Penner
8 months
@corg_e the world is so much more fragile than the vast majority of ppl seem to think lol
1
5
149
@zer0pwn
Dominik Penner
10 months
Next week at @mandconsulting_ , we're dropping a new tool and blog post we've been working on. I hope you like secrets - and mass exploitation & disclosure of Fortune 100-500s on previously less-documented attack surface.
Tweet media one
6
24
149
@zer0pwn
Dominik Penner
4 years
Thanks to @_IntelligenceX 's phonebook API, subdomain and email enumeration has never been easier. Great tool to add to your inventory. #security #recon #bugbounty #bugbountytip #bugbountytips #redteam #discovery #osint #recon #bounty
4
86
146
@zer0pwn
Dominik Penner
5 years
Bruteforce subdomains from browser (thanks to Marzavec). Works by using DNS over HTTP for resolution. #security #bugbounty #bugbountytip #security #redteam #osint #discovery
2
71
137
@zer0pwn
Dominik Penner
5 years
Return a list of endpoints from a swagger.json. Pass them to your fuzzer(s), +profit? curl -s hxxps://petstore.swagger.io/v2/swagger.json | jq '.paths | keys[]' #bugbounty #bugbountytips #redteam #security #oneliner #bash
Tweet media one
0
54
134
@zer0pwn
Dominik Penner
4 years
LOL bruh
@disclosedh1
publiclyDisclosed
4 years
Glassdoor disclosed a bug submitted by safehacker_27: - Bounty: $1,000 #hackerone #bugbounty
Tweet media one
0
25
133
5
17
125
@zer0pwn
Dominik Penner
5 years
Fun with custom URI handlers, featuring another Origin RCE and a bypass for the first one.
2
52
125
@zer0pwn
Dominik Penner
4 years
social engineering is just lying with extra steps
6
21
120
@zer0pwn
Dominik Penner
4 years
Months ago @leet_sauce , @ItsNux and I located an SQL Injection on one of the largest US universities. It turned out to be some open source software, and was used on multiple universities. It ran on ColdFusion and was difficult to pinpoint all the vulns, so I wrote a scanner.
Tweet media one
5
25
117
@zer0pwn
Dominik Penner
9 months
Beautiful write-up and research performed by Ben Barnea from the Akamai team. - "An attacker on the internet can chain the vulnerabilities together to create a full, zero-click remote code execution (RCE) exploit against Outlook clients." "The first
Tweet media one
3
31
114
@zer0pwn
Dominik Penner
5 years
Hey uh, @PepsiCo , were you aware you have what appears to be a (now dead?) XXE payload/shell on one of your subdomains indexes lol? hxxps://share-ite.brandcentral.pepsico.com
Tweet media one
3
23
105
@zer0pwn
Dominik Penner
4 years
I am super thrilled to announce I've accepted a position with @NCCGroupInfosec . 2020s been a pretty weird year considering I was supposed to start earlier this year, but it all worked out in the end. Very excited to build a career with such a great organization. 🥳🥳
15
6
106
@zer0pwn
Dominik Penner
5 years
Cognitive Bias - A diagram showing how common cognitive mistakes are made.
Tweet media one
1
48
102
@zer0pwn
Dominik Penner
5 years
You spent so much time pretending to be a hacker that you never had the opportunity to actually become one yourself.
17
15
95
@zer0pwn
Dominik Penner
6 years
Hey uh, @Respawn , this kind of stuff shouldn't be getting indexed, should it? "securityToken" ???
Tweet media one
7
29
86
@zer0pwn
Dominik Penner
5 years
KDE 4/5 KDesktopFile (.desktop) Command Injection. Fits in a tweet. [Desktop Entry] Icon[$e]=$(echo${IFS}0>~/Desktop/zero.lol&) #redteam #0day #security #bugbounty #bugbountytip #bugbountytips #kde #rce #zerodotlol #zerolol
3
68
97
@zer0pwn
Dominik Penner
4 years
Have an SQL injection vulnerability? Got the admin password but can't crack the hash? Use a SQL UPDATE statement to modify the password value to something you know. +Profit #bugbountytip #redteam #security #owasp #sql #database #bounty #hacking #infosec #bugbounty
Tweet media one
4
30
97
@zer0pwn
Dominik Penner
5 years
My 2019 recap: - Discovered RCE in EA's Origin client. - Discovered another RCE in EA's Origin client. - Discovered a code execution bug in KDE that's been dormant for ~16yrs. - Discovered an XXE vulnerability in software used by the Federal Reserve.
4
6
96
@zer0pwn
Dominik Penner
5 months
i must admit tho it is slightly refreshing to see something like this again
4
0
96
@zer0pwn
Dominik Penner
5 months
it’s amazing isn’t it
@bl4sty
blasty
5 months
you gotta appreciate the way they shipped the backdoored object file. added some "test" data to the source tree that gets unxz'd and (dd) carved in a specific way, that is fed into a deobfuscator written in.. awk script and the result gets unxz'd again
Tweet media one
6
135
738
2
5
95
@zer0pwn
Dominik Penner
4 years
Quick #bugbountytip that some seem to forget about. You can use brace expansion in bash to bypass space/$IFS restrictions. Example: {nc,-lvp,31337} turns to nc -lvp 31337 #redteam #bugounty #bugbountytips #security #infosec #webapp #exploit
3
33
92
@zer0pwn
Dominik Penner
4 years
Bug bounties are internet sweatshops. Change my mind.
4
17
90
@zer0pwn
Dominik Penner
3 years
Wow, a year ago to the day I began my career in infosec with NCC Group. Working in security was always my dream job as a kid. Through years of dedication, trials and errors, that dream has come true. 13 year old Dom would be proud. Never stop learning. 🙏
5
3
85
@zer0pwn
Dominik Penner
4 years
This is insane.
2
34
85
@zer0pwn
Dominik Penner
5 years
that's it im disabling my DM requests
Tweet media one
15
5
75
@zer0pwn
Dominik Penner
9 months
it looks like through the publicly available pocs, people aren’t executing javascript yet, so it’s entirely possible it’s just an html injection issue. im personally convinced it can be escalated but only time will tell :)
2
0
82
@zer0pwn
Dominik Penner
4 years
Not particularly restricted to browser based features. I've had success in custom apps from Electron to Qt based with the following: custom-app://views/layout.html to custom-app://views/../../../../secret.txt #bugbounty #bugbountytip #bugbountytips #security #infosec
@HusseiN98D
Hussein Daher
4 years
Browser-Based application LFI file:///etc/passwd blacklisted? Use "view-source:file:///etc/passwd" "view-source" is often forgotten by developers in blacklists. #BugBounty #BugBountyTip #BugBountyTips
15
232
813
1
16
77
@zer0pwn
Dominik Penner
4 years
Testing an application for OOB payloads? XXE, SQLi? Maybe you just need a public facing HTTP server to mock a response. My go to without spinning up another box or sshing into one, is Beeceptor. #bugbountytips #bugbountytip #security #bugbounty
Tweet media one
3
25
78
@zer0pwn
Dominik Penner
4 years
Keep your mind open, but don't let your brain fall out.
2
12
72
@zer0pwn
Dominik Penner
4 months
from russia with love
Tweet media one
6
9
72
@zer0pwn
Dominik Penner
5 years
Can we stop calling ppl who DDoS shit hackers? Journos... why the hell do you even call them hackers to begin with? Looking for legitimate answers as I'm confused as hell.
14
13
62
@zer0pwn
Dominik Penner
1 year
i think to date my funniest disclosure experience was reporting a SQLi in McDonalds Canada and being compensated 3 Big Macs
9
3
66
@zer0pwn
Dominik Penner
4 years
If Eternal Blue was so good... how come there's not an Eternal Blue 2? ah shit nvm
4
12
65
@zer0pwn
Dominik Penner
5 years
A short story. #Motherboard #Vice
Tweet media one
Tweet media two
Tweet media three
4
13
56
@zer0pwn
Dominik Penner
4 years
I've run into a bunch of Java based webapps that had directory traversal filters and was able to successfully bypass them by using a backslash (\) rather than forward slash when traversing. Just remember to try it using curl, because browsers automatically correct "\" to "/".
@Dhamu_offi
Dhamu
4 years
#bugbountytip #bugbounty Directory listing bypass payloads : Any file name or folder name ..%3B/ /%20../ /.ssh/authorized_keys /.ssh/known_hosts /%2e%2e/google.com ..%3B/////////////////////////////////
Tweet media one
Tweet media two
5
330
803
2
9
63
@zer0pwn
Dominik Penner
3 years
Describe how old you are using a picture. I’ll go first:
Tweet media one
16
9
60
@zer0pwn
Dominik Penner
4 years
If you think about it, a hacker's whole job is to fuck around and find out
4
5
59
@zer0pwn
Dominik Penner
7 months
Tweet media one
@FP_Champagne
François-Philippe Champagne (FPC) 🇨🇦
7 months
Criminals have been using sophisticated tools to steal cars. And Canadians are rightfully worried.   Today, I announced we are banning the importation, sale and use of consumer hacking devices, like flippers, used to commit these crimes. 🔗:
762
73
293
4
12
57
@zer0pwn
Dominik Penner
5 years
Broke: Reporting a low-sev bug. Woke: Issuing a request for a feature that would complete the exploit chain.
0
11
57
@zer0pwn
Dominik Penner
5 years
Coming soon to a terminal near you.
Tweet media one
3
11
53
@zer0pwn
Dominik Penner
4 years
Tweet media one
5
12
51
@zer0pwn
Dominik Penner
5 years
One of the cooler bugs we ( @UDSec_UK ) found in 2019 would definitely be the CSTI->XSS->RCE chain in EA's Origin client :) #hacking #bugbounty #security #redteam #bugbountytips #xss #rce
0
22
50
@zer0pwn
Dominik Penner
5 years
Had a good time finding RCE in EA #Origin 's client with my good friend @Daley . You can expect more from Underdog Security in the future. Give us a follow: @UDSec_UK :D #security #pentesting #redteam #bugbounty #underdog
4
15
48
@zer0pwn
Dominik Penner
8 months
im gonna be controversial and say the only correct definition is an insatiable curiosity
@techspence
spencer
8 months
What does the “hacker mindset” mean to you?
99
3
70
4
9
52
@zer0pwn
Dominik Penner
2 years
well that sucks… got yeeted in the NCC layoffs. it was a blast. i’ll need some time to process this before i come up with a better tweet. sending hugs to all of those who were affected ❤️
11
5
50
@zer0pwn
Dominik Penner
1 year
“we’ve been breached by extremely sophisticated attackers” the sophisticated attackers in question:
Tweet media one
1
6
51
@zer0pwn
Dominik Penner
5 years
KDE Plasma 4/5 RCE (07/28/2019). Thanks to @ItsNux for helping out with pieces of the payload.
3
19
50
@zer0pwn
Dominik Penner
5 years
The most recent post is up! Vulnerability Disclosure & LG Electronics. A story on how we located, exploited & reported an SQL Injection vulnerability to LG Electronics. #redteam #security #bugbounty #bugbounties #bugbountytips #zerodotlol #sql #owasp
3
20
39
@zer0pwn
Dominik Penner
4 years
Thanks to @defconisov3r bringing up the fact you can evaluate hex and unicode, we've got even more obfuscated payloads! Before: cat /etc/passwd After: {$'\x63'\a$'\x74',/\e''*?/\p*$'\x64'} #bugbountytip #bugbountytips #bugbounty #obfuscation #bash #security #redteam
Tweet media one
2
16
44
@zer0pwn
Dominik Penner
9 months
Rebane doing the Lord’s work
@rebane2001
Rebane
9 months
Oh nevermind, you can totally get code execution with this :P @valvesoftware @CounterStrike please fix quick before anyone evil abuses this
Tweet media one
9
16
168
3
0
42
@zer0pwn
Dominik Penner
5 years
Life's what you make it, so stop complaining and hack something. 👻
3
16
36
@zer0pwn
Dominik Penner
5 years
Axway SecureTransport 5.x Unauthenticated XML Injection / XXE 0day + Analysis. #redteam #security #bugbounty #bugbountytips #axway #0day #zer0 #pwn #zero #lol #zerodotlol
1
21
40
@zer0pwn
Dominik Penner
5 years
The Year of Linux on the Desktop (CVE-2019-14744). Featuring a command injection bug in KDE 4 and 5. #security #bugbounty #bugbountytips #redteam #0day #exploit #security #kde #zerodotlol #zerolol #analysis #poc
0
18
41
@zer0pwn
Dominik Penner
5 years
i use arch btw
Tweet media one
6
4
35
@zer0pwn
Dominik Penner
3 months
have you seen this man in your dreams too? 🤯
Tweet media one
Tweet media two
@aejleslie
Alexander Leslie
3 months
We have names. Operation Endgame. 🇩🇪 🚨 BKA:
Tweet media one
19
131
512
4
4
40
@zer0pwn
Dominik Penner
3 months
kali linux daily driver? skill issue
1
2
36
@zer0pwn
Dominik Penner
9 months
i would like to clarify while i said xss in my initial post, there isn’t yet evidence to suggest that’s what’s occurring here. it looks like a simple html injection issue here with a limited html subset. often times in these situations applications have their own ways of
1
0
39
@zer0pwn
Dominik Penner
5 years
Build an efficient pwn environment (by bet4it)
1
12
37
@zer0pwn
Dominik Penner
4 years
I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. #Anonymous
Tweet media one
5
3
34
@zer0pwn
Dominik Penner
9 months
speak of the devil
@rebane2001
Rebane
9 months
@n00py1 @zer0pwn @ReneFreingruber I did manage to find a way to get JS code execution (not through script tags), but this exploit is patched with the latest client update
1
1
22
1
0
37
@zer0pwn
Dominik Penner
4 years
How to spot a possible entrapment online: You're looking at it.
@YourAnonCentral
Anonymous
4 years
How to spot a possible entrapment operation online. - asks for hackers in a public forum - asks about your skills and previous hacks - asks you to click on suspicious links - uses antiqued memes or language in an attempt to fit in "lulz, kek, LOL" - wants to start a new 'crew'
161
1K
9K
6
5
30
@zer0pwn
Dominik Penner
5 years
I fucking love hacking
1
4
35
@zer0pwn
Dominik Penner
5 years
Put the offsec tools in the bag. Slowly...
Tweet media one
1
7
33
@zer0pwn
Dominik Penner
1 year
Wow. I wrote briefly about .URL files in 2019 ( ) and a potential vector to exploit underlying vulnerable software. Really cool to see other tricks people using to abuse them. This one in the tweet shared by @fuzz_sh is much better 😅
@jkamdjou
Josh Kamdjou
1 year
This works on Windows 11 and both Gmail and MSFT will let it through to the inbox. Confirmed by @amitchell516 and @samkscholten New detection/hunt rule is live for this, which looks for UNC paths inside URL file attachments (h/t @amitchell516 !):
Tweet media one
2
60
119
2
7
38
@zer0pwn
Dominik Penner
4 years
Those Anon DDOS scripts are some of the ugliest python I've read in a long time lmao. Hardly even legible
4
5
35
@zer0pwn
Dominik Penner
4 years
Just got this notification. Anyone know who this guy is? Any help appreciated.
Tweet media one
4
1
34
@zer0pwn
Dominik Penner
5 years
Look mom I'm famous cc @malwareunicorn
3
2
35
@zer0pwn
Dominik Penner
7 months
she sells c shells by the sea shore
5
5
35
@zer0pwn
Dominik Penner
5 years
I've recieved a few inquiries regarding dropping 0days discovered by other researchers on . Obviously with full credit, etc. If this is something that sounds interesting to you feel free to get in touch with me :)
3
9
35
@zer0pwn
Dominik Penner
4 years
hack the planet
Tweet media one
2
1
33
@zer0pwn
Dominik Penner
5 years
Alright, the IRC is setup. Come talk security with us :) #hackers #zerodotlol #zeroday #security #redteam
Tweet media one
2
7
33
@zer0pwn
Dominik Penner
5 years
so i adopted a rescue kitty today. thankful. ❤️
Tweet media one
2
0
29
@zer0pwn
Dominik Penner
5 years
The amount of personal attacks I've recieved from KDE developers is actually really disappointing. As the majority of you know, I am a whitehat and have rarely irresponsibly disclosed critical vulnerabilities. Despite this I'm being painted as a villain for wanting to engage—
7
4
34
@zer0pwn
Dominik Penner
5 years
Please stop uploading your massive 1920x1080 res PoC videos to twitter. No one can see a thing lol
5
4
35
@zer0pwn
Dominik Penner
4 years
Found another super cool bug in all versions of KDE.
4
0
34
@zer0pwn
Dominik Penner
4 years
Jackie Singh literally took a friendly mouse game and tried to add a racist spin on it in order to create tension. Tell me how THAT'S NOT RACIST in itself.
@UK_Daniel_Card
mRr3b00t
4 years
whos' this prick? I checked they are on my blocklist. but if anyone want to paint their own racist, shitty views onto my little friendly fun mouse they can fuck right off!
Tweet media one
47
5
116
3
4
30
@zer0pwn
Dominik Penner
1 year
Just finished reading “Mashing Enter to Bypass Full Disk Encryption” by @PulseSecurityNZ Using a microcontroller with the following code they were able to break the boot process and drop into a root shell. Brilliant and hilarious.
Tweet media one
0
7
32
@zer0pwn
Dominik Penner
4 years
Does the Twitter algorithm favor whitehats, or blackhats? 🤔
Tweet media one
Tweet media two
3
10
32
@zer0pwn
Dominik Penner
5 years
Hello and good morning to everyone except Kevin Mitnick.
4
2
29