@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Cross Site Scripting Vulnerability in Oracle

So as you already know that Cross Site Scripting is an attack in which we can inject custom JavaScript codes & the browser executes them as the part of the page. So for the proof of concept I used a simple alert(document.domain) payload, but the exploitation is not limited.

https://www.ifrahiman.com/2018/02/cross-site-noscripting-vulnerability-in.html#more

🧠 @Phantasm_Lab
Webinar: Tips on Building a World Class Bug Bounty Program From Senior Red Team Expert, Mack Staples

There’s nothing more important than protecting the lifeblood of your business: customer data. No one takes this more seriously than Zenefits, the All-in-One HR Platform. Zenefits holds sensitive personal and financial data for over 10,000 small and medium businesses. That’s a lot of high risk customer data, including Personally Identifiable Information (PII) and Protected Health Information (PHI). Thankfully, Zenefits has a world-class security program and a Red Team that knows, like many other companies with similarly sensitive data, they must be on their game 24/7. Mack Staples, Senior Manager of Zenefits' Red Team, walks through some best practices they use to enable bug bounties as a core product security strategy. He discusses tips, practical advice, and insights into how they’ve built their world-class bug bounty program into one of the top program’s on the HackerOne platform.

https://www.youtube.com/watch?v=USRi1M2mlm8

🕴 @Phantasm_Lab
Official Black Hat Arsenal Tools Github Repository
XXE Recursive Download

This tool exploits XXE to retrieve files from a target server. It obtains directory listings and recursively downloads file contents.

https://github.com/GDSSecurity/xxe-recursive-download
QRLJacking - A New Social Engineering Attack Vector

QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the “Login with QR code” feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker’s QR code which results in session hijacking.

https://github.com/OWASP/QRLJacking

🕴🏼 @PhantasmLab
Forwarded from CryptoRave 2025
Mais do que nunca é hora de falar da importância da CryptoRave. Mais do que nunca é hora de compartilhar em todos os grupos que você faz parte.

A CryptoRave é um evento de muita resistência: voluntário, sem publicidade, sem terno, gravata e pão de queijo murcho. Financiada por todos nós. Construída por nós, com uma programação coletiva.

Ano passado 600 pessoas acreditaram e ajudaram a realizar o evento. Esse é um evento único no Brasil e que precisa continuar existindo.

É por esse motivo que nós agradecemos a cada um de vocês que, de alguma forma, em algum momento desses cinco anos apoiou a CryptoRave. Nem sempre dá para apoiar com dinheiro, mas divulgar para os/as amigos/as é sempre possível e muito importante.

Divulguem! <3

https://www.catarse.me/cryptorave2018