@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Who, What, Where, When, Wordlist by @TomNomNom #NahamCon2020

00:25 what is a wordlist ? its a list of words, used for guessing things instead 01:04 WHY are they useful ? 02:21 WHERE, subdomain enumeration 02:41 path guessing, ffuf 02:49 authentication guessing, kind of the oldest use case username and passwords 02:57 API, RPC 03:17 headers 03:35 Pre-baked lists 04:49 what's the problem with those wordlists 06:25 custom wordlist 07:28 manually curated list 08:17 target-specific lists 09:36 Getting path data 12:08 google dorking 12:56 webpaste 15:28 i just show a little bit of the configuration of this webpaste extension 18:55 processing path data, unfurl 20:37 sed, extract all the parts 22:45 Using the list, ffuf is good, burp intruder, meg, concurl 24:50 finding words unique to a target 26:35 tokenizing

https://youtu.be/W4_QCSIujQ4
Defesa do Trabalho de Graduação (TCC) em Engenharia da Computação no ITA em 2020

https://youtu.be/Pnjjm65N-DA
Internal Research Cyber Operations - Military Resources About Reverse Engineering
Forwarded from @Phantasm_Lab ([L]uth1er)
[Exploit] - Impropper Access Control - Arbitrary File Download + IDOR (0day Vulnerability) MEC

I found a IDOR Lead to Arbitrary File Download in a subdomain of the mec.gov.br, with this vulnerability we can generate random id and request to the server to discovery sensitive files, with this vulnerability it's possible to access, bidding for works,PDF Files sent via emails, information about City's of the country.

https://youtu.be/yOzoIGJJqvk