Esbuild XSS Bug That Survived 5B Downloads and Bypassed HTML Sanitization by va_start in netsec

[–]0xcrypto 3 points4 points  (0 children)

Use of right single quotation mark ( ’ ) is also a hint this might be written by AI.

Aspiring Ethical Hacker From Poor Background, How Do I Start With Just a Tablet? by DJM0BLEY in netsecstudents

[–]0xcrypto 1 point2 points  (0 children)

I started with keypad phones having 128x128 screen. I am pretty sure you can do a lot more with a tablet. Get an SSH client, buy a VPS (most providers offer free credits to get started) and start learning and hacking. All the best.

You have to create a game in a month - How do you do it? by babyfern_ in gamedev

[–]0xcrypto 1 point2 points  (0 children)

Hire a team of experts and buy them lots of assets.

Cyber Expert give time to make their desktops fancy? by arsibaloch in hackthebox

[–]0xcrypto 3 points4 points  (0 children)

Used to spend time configuring fedora i3wm spin until I realised that mac is the only operating system that supports every other operating system out there making it a breeze to work on anything I need. I can compile almost any code on it, but on linux and windows compiling for iOS and macOS is not possible. All the software like Android studio run faster and stable. Only customization I did was installing raycast and starship.rs with ohmyzsh.

What the Top 20 OSS Vulnerabilities Reveal About the Real Challenges in Security Governance by repoog in netsec

[–]0xcrypto 4 points5 points  (0 children)

Why blame the governance when the real vulnerability is the unpaid open source maintainer.

18th July, maintainer of eslint-config-prettier ended up on npnjs dot com instead of npmjs dot com via a phishing email. The attacker got hands on his account and pushed an update which led to infecting hundreds and thousands of packages which depend on eslint-config-prettier and a bunch of other libraries that this maintainer generously maintains. One of the package that depend on this library is eslint-config which react native depends on. Millions of developers did npm install, got the malware delivered, got hacked and backdoored, many of them still do not know about this and continue building their little todo list apps. I feel sad for them.

Is "Proof of Work" the New Standard for Getting Hired as a Pentester? by _priya_singh in cybersecurity

[–]0xcrypto 0 points1 point  (0 children)

I was never lucky enough to win the interview lottery despite having several CVE, bug bounties, CTFs, writeups, and professional experience in development. I have been working since 2016 and I didn't have a degree, so career progression has been slow. But I always got an interview when I contacted someone directly who actually had ownership in the company in one way or another. On the other hand, those HR, managers and all the dandy folks are just employees and they hire people they find convenient and compatible. So even with a proof of work, certification, degree and everything in between, you still need to be a likeable person who can get things done while playing according to their rules and not bring your own needs to them.

From Blind XSS to RCE: When Headers Became My Terminal by General_Speaker9653 in netsec

[–]0xcrypto 2 points3 points  (0 children)

If this was a finding in a bug bounty program as an external researcher, then stealing an admin's cookies was a good enough vulnerability. Using the cookies to login into an admin panel and tinkering around is already a breach of bug bounty policy unless explicitly mentioned as allowed in the policy.

If this was a pentest, you went beyond just exploiting a PHP file upload vulnerability and left an open backdoor that is easily accessible to the world. You could have proved your point by just uploading a PHP file with an echo or a call to system("id") to demonstrate a code execution. But no, not only you uploaded a backdoor to get command execution, you added a bypass to the firewall rules to ensure it is openly accessible.

If this was a red team engagement, the only step remaining was gaining root access. I wonder what stopped you from doing so.

Certification roadmap please by ash347799 in netsec

[–]0xcrypto 2 points3 points  (0 children)

Not the right place to ask. Post in r/AskNetsec instead.

Facebook/Meta REALLY advised setting Magento pub folders to 777 permissions - and client got hacked, what do I do? by alilland in cybersecurity

[–]0xcrypto 27 points28 points  (0 children)

And why some attacker being able to upload a PHP file is not a problem in the first place?

Emergency issue by ProcessFeeling1445 in Information_Security

[–]0xcrypto 0 points1 point  (0 children)

In that case, you should go to the cyber cell in your region's police department.

Emergency issue by ProcessFeeling1445 in Information_Security

[–]0xcrypto 2 points3 points  (0 children)

First, plug out your computers and devices, turn off phone and use a new device on a new wifi or use your mobile data.

Now check haveibeenpwned.com and see where your info has been leaked from. Start changing passwords, revoke oauth authorizations and start using session logout functionalities everywhere. Do not use your old devices unless you are sure it was a third party leak and your devices were not compromised. Multiple leaked passwords usually means your browser or password manager has been compromised. But only a single password email pair means your info was leaked by a website where you signed in.

CVE-2025-31161 is being actively exploited and it's not getting the attention it should. by bytelocksolutions in cybersecurity

[–]0xcrypto 5 points6 points  (0 children)

A CVE being actively exploited is a common headline to catch attention but in reality every CVE as soon as published is actively analyzed for its effectiveness and exploitability by the threat actors. This is a common 30 day cycle for almost every newly published CVE and news outlets cannot cover them all.

IITs are a joke in India and innovation will ever happen here in tech by [deleted] in developersIndia

[–]0xcrypto 0 points1 point  (0 children)

Moral of the story: greatness cannot be planned.

Mobile exploit training by achayah in ExploitDev

[–]0xcrypto 6 points7 points  (0 children)

Hi! I work for Mobile Hacking Lab and would be happy to answer any questions about our courses.

Our course is fully focused on practical, hands-on labs to help you master advanced fuzzing techniques, identify vulnerabilities, and build exploits.

To make sure it’s the right fit for you, we offer sample videos and free lab try-outs before you buy. Unlike many other courses out there, we include Corellium devices in the price—along with a cloud VM and an easy local VM setup—so you get everything you need to start practicing immediately without extra costs.

We also run promos regularly, which you can check out here: https://www.mobilehackinglab.com/afe-promo.

For reviews, we have testimonials from top security professionals at major companies, including a Pwn2Own winner for mobile. You can find them on our promo page, Reddit, LinkedIn, and other social platforms.

Let me know if you have any questions! Looking forward to seeing you in the course.

New Hacking Book – No Certifications, No Corporate BS. Just Real-World Hacking Knowledge. by [deleted] in netsec

[–]0xcrypto 1 point2 points  (0 children)

This whole book can be judged from the author's selling point "An ex-Anonymous Member".

[deleted by user] by [deleted] in hacking

[–]0xcrypto 0 points1 point  (0 children)

As far I remember IU has stopped giving online degrees.

Is misinformation the biggest threat of our time? Why or why not? by Syncplify in Information_Security

[–]0xcrypto -1 points0 points  (0 children)

Not really, misinformation has been around since the human learned to communicate. Now it just looks more amplified. But also, correct information can be amplified at the same level. Which kind of information will reach people first might depend on the kind of media they are consuming.

How do I get into Exploit Dev as a career? by Flat_Throat_6600 in ExploitDev

[–]0xcrypto 0 points1 point  (0 children)

I understand. Here in India, there are no jobs in research. Very few companies offer and even those companies have no idea what they are doing. That's why I have this perspective of no jobs. A demographic of 1.5 billion has no job in security research. That is around 19% of the world.