@aboul3la Someone interested can read these files from the server, I have tested them.

logo.gif
http_auth.html
user_dialog.html
localization_inc.lua
portal_inc.lua
include
nostcaccess.html
ask.html
no_svc.html
svc.html
session.js
useralert.html
ping.html
help
@aboul3la /2
app_index.html
tlbr
portal_forms.js
logon_forms.js
win.js
portal.css
portal.js
sess_update.html
blank.html
noportal.html
portal_ce.html
portal.html
home
logon_custom.css
portal_custom.css
preview.html
session_expired
custom
portal_elements.html
commonspawn.js
common.js
@aboul3la /3
appstart.js
appstatus
relaymonjar.html
relaymonocx.html
relayjar.html
relayocx.html
portal_img
color_picker.js
color_picker.html
cedhelp.html
cedmain.html
cedlogon.html
cedportal.html
cedsave.html
cedf.html
ced.html
lced.html
files
pluginlib.js
shshim
do_url
clear_cache
@aboul3la /4
connection_failed_form
apcf
ucte_forbidden_data
ucte_forbidden_url
cookie
session_password.html
tunnel_linux.jnlp
tunnel_mac.jnlp
sdesktop
gp-gip.html
auth.html
wrong_url.html
logon_redirect.html
logout.html
logon.html
test_chargen
@aboul3la some more paths to read
customization
bookmarks
locale
+CSCOT+
+CSCOCA+
+CSCOL+
admin
+CSCOU+
+CSCOE+
sessions

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Rohit Gautam 🤘🏴‍☠️

Rohit Gautam 🤘🏴‍☠️ Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @HackerGautam

18 Oct
The Dunning–Kruger effect :

Hypothetical cognitive bias stating that people with low ability at a task overestimate their own ability, & that people with high ability at a task underestimate their own ability

People in #bugbounty experience this✅

A thread 🧵👇
@shifacyclewala
Examples of the Dunning-Kruger effect:

➡️Work : Dunning-Kruger effect can make it difficult for people to recognize and correct their own poor performance.

That’s why employers conduct performance reviews, but not all employees are receptive to constructive criticism received.
➡️ Politics:
Supporters of opposing political parties often hold radically different views without realising what they actually knew.
Read 7 tweets
30 Sep
Job Possibilities in Security Domain 👇

🧵

→ Security Analyst

Role: Analyses and assesses vulnerabilities in the infrastructure (software, hardware, networks), investigates available tools and countermeasures to remedy the detected vulnerabilities.

@shifacyclewala
→ Security Consultant/Specialist:

Works with any one or all of the other roles/titles related to securing computers, networks, software, data and/or information systems against malwares or risks.
→ Computer Security Incident Responder:

One of creates a rapid response to security threats and attacks such as viruses and denial-of-service attacks in the organisation
Read 14 tweets
30 Sep
FREE Resources to Learn Programming ✅👇
🧵

1. hackerrank.com

HackerRank- Learn and Solve Coding Challenges and boost your learning.

@shifacyclewala
#programming #development
2. javascript.info

Learn Modern JS principles & Tutorials
3. w3schools.com

Learn HTML, CSS, JS, Programming for FREE from one of the oldest resources
Read 15 tweets
30 Sep
10 Useful websites for cyber security.

🧵

@shifacyclewala
#infosec #bugbounty #security
1. @DanielMiessler

An experienced cybersecurity expert, consultant and writer. Worth reading his blogs, curated newsletters, essays, podcasts and high-quality writing.

Link:
danielmiessler.com
2. @gcluley

A longtime industry expert who held senior roles with Sophos and McAfee before deciding to begin “working for myself” in 2013

Link:
grahamcluley.com
Read 11 tweets
20 Sep
A comprehensive thread on OWASP!
What is OWASP Top 10?
2013 vs 2017 vs 2021 ?
How OWASP is useful for pentesters and bug bounty hunters?
My Views on OWASP 2021 Update?

cc - @shifacyclewala @Hacktifycs
Who is Owasp?
→ Open Web Application Security Project
→ its a non-profit foundation dedicated to improving the security of software. @owasp operates as open community model, where anyone can participate in & contribute to projects, events, online chats, and more.
{1/17}
What is Owasp?
→ OWASP Top 10 is an online document on OWASP’s website that provides ranking of and remediation guidance for the top 10 most critical web application security risks

{2/17}
Read 18 tweets
18 Sep
A comprehensive thread on XXE Attacks.

What is XML, Entities and DTD?
How OWASP Top 10 2021 merged XXE in Security Misconfiguration?
XXE exploitation Types & Payloads for pentesters and bug bounty hunters


{1/18}
Thanks to @shifacyclewala @Hacktifycs
→ XXE stands for XML External Entity
→ XXE is possible in applications which processes XML data in client side or server side
→ All Office documents process XML data. Eg -docx,xlsx,pptx

{2/18}
→ XXE attacks are possible when external entities are included and are processed.
→ OWASP Top 10 2017 introduced XXE at A-4 position.
→ OWASP Top 10 2021 merged in Security Misconfiguration at A-5

{3/18}
Read 18 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(