18 Followers
5 Following
15 Posts

Security enthusiast
I like clicking buttons and seeing what happens
Bash one-liner fanatic
regex masochist
Contact me if you need any help (on twitter) :) 🏳️‍🌈

(she/her)

Mediumhttps://medium.com/@nynan
funny bird app (twitter dot com)https://twitter.com/_nynan
Automated and Continuous Recon/Attack Surface Management — Amass Track and DB

My prior blog talked about some of the most underrated features of Amass and was largely appreciated. I received feedback from @Jeff_Foley about it and decided to investigate further, and discovered…

Medium

@nyxilar and I spent 6~ months applying classic #bugbounty techniques to correlate 42k *root* domains, deanonymise and track a new threat actor: Fangxiao.

We're excited to give a talk about this at @BSidesLondon
.
Read the white paper at @Cyjax_Ltd
.

#BsidesLDN2022 #infosec #bugbountytips #cybersecurity #cti

@nynan and I spent 6 months tracking a new TA, Fangxiao, and are presenting our work at BSides London! Fangxiao carry out campaigns spread via WhatsApp, using 42,000+ sites & impersonating 100s of brands since at least 2019. Read about it here: https://www.cyjax.com/2022/11/14/fangxiao-a-chinese-threat-actor/
#infosec #cti #phishing #bsides #osint #threathunting #threatintel
Fangxiao: a Chinese threat actor

Phishing campaigns continue to increase globally. These operations offer an easy route for cybercriminals to generate revenue, steal credentials and spread malware. Cyjax has recently investigated a sophisticated, large-scale phishing campaign that exploits the reputation of international, trusted brands, and targets businesses in multiple verticals including retail, banking, travel, pharmaceuticals, travel and energy. We are … Continued

Cyjax
What I learnt from reading 217* Subdomain Takeover bug reports.

A comprehensive analysis of Subdomain Takeovers (SDTO), DNS Hijacking, Dangling DNS, CNAME misconfigurations… My two prior blogs, What I Learnt From Reading 220 IDOR bug reports, and What I Learnt…

Medium
How to **Actually** Use Amass More Effectively — Bug Bounty

Considering becoming a member on medium? Use this link at no extra cost to yourself, and support me :) (https://medium.com/@nynan/membership) Amass is one of the most recognisable, well-made and…

Medium
Bug Bounty Recon: Horizontal Correlation. - nynan - Medium

Example: We start with domain.com but how do we find other domains owned by the same user? perhaps secretDomain.com or vulnerableDomain.com The first step of effective bug bounty hunting is in depth…

Medium