POP POP RET

12 Followers
30 Following
17 Posts
Definitely going to submit something https://unpromptedcon.org/
Agenda - [un]prompted

[un]prompted

I often tend to delay or forget to post my methodology which I believe is actually the missing component to vulnerability research.

Learning from issues trackers and blog post is baseline but also having your own swagger to the research is a must.

I do enjoy tackling hard problems :)

Pro Tip: Dive into bug trackers. I’ve found huge value in studying previously reported and resolved bugs with security impact (vulnerabilities).

Why it's great:

- Learn unfamiliar subsystems.
- Follow real-world PoCs from start to finish.
- Apply insights directly to your own targets.

This practice has been consistently sharping my skills both for dev and security.

I need to update posts here more often as well.

Mythical API defense 🧌 found:
- Found a forbidden (403) path
- Check for subpaths beyond that
- Found an image
- Sub-sequential response length grew from 1034 to 830319 🙃

Great defense or it's a bug...

Bug Hunting Tip:

- 💯 Build your own API wordlist.
- Why? Public lists are too well-known and overused.
- Craft one tailored to your hunt for a competitive edge.
- Don’t forget to test these wordlists on URL subpaths, you might uncover unique bypasses.

#bugbountytips

Someone want to tell me what MURL Package Format ?!? I believe is definitely game related.

4d 55 52 4c 28 bd 06 00 52 50 4b 47 48 45 41 44 4c 00 00 00

As targeted as JavaScriptCore and Webkit have been for ages, I am curious of the diff on the patch for CVE-2024-44308 and CVE-2024-44309...

What would be the Java equivalent to K&R C Programming book?

#books #recommendations