@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Session Hijacking Cheat Sheet, Attack Examples & Protection

As the name suggests, Session Hijacking involves the exploitation of the web session control mechanism. The attacker basically exploits vulnerable connections and steals HTTP cookies to gain unauthorized access to sensitive information/data stored in web servers.

https://www.checkmarx.com/knowledge/knowledgebase/session-hijacking

🕴 @Phantasm_Lab
Forwarded from @Phantasm_Lab ([L]uŧh1er)
H2HC 10 - Palestra: Sandboxing is the shit - Jonathan Brossard

https://www.youtube.com/watch?v=1vgKym3fASg

🕴🏽 @Phantasm_Lab
#Perfil #HackerOne #Series

Link

Reputation: 3463 Impact: 14.90
Bugs found: 307 Thanks received: 46

https://hackerone.com/linkks

🕴🏽 @Phantasm_Lab
ACME TLS-SNI-01/02 challenge vulnerable when combined with shared hosting providers

Frans Rosén (fransrosen)

The ACME TLS-SNI-01 (and TLS-SNI-02) specification assumed wrong in terms of how current major cloud providers routed and validated domains. This was reported earlier this week to Let's Encrypt, and they decided to disable the method. Today Let's Encrypt decided to sunset both TLS-SNI-01 and TLS-SNI-02 due to the vulnerability I found.

https://hackerone.com/reports/304378

🕴🏽 @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Hacker Wars takes you to the front lines of the high-stakes battle over the fate of the Internet, freedom and privacy.

🕴🏼 @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Hacker Wars leva você até a linha de frente da batalha de alto risco sobre o destino da Internet, liberdade e privacidade.

🕴🏼 @Phantasm_Lab