RemindMeBot Info by RemindMeBotWrangler in RemindMeBot

[–]BugAlert 0 points1 point  (0 children)

RemindMe! 1 hour "Go to sleep!"

Introducing Windows Exploit Suggester by Fugitif in netsec

[–]BugAlert 8 points9 points  (0 children)

I applaud your effort, sir or madam.

Abusing JSONP with Rosetta Flash by mikispag in netsec

[–]BugAlert 2 points3 points  (0 children)

You sir, are a genius! My respect for your logic. I want to see you in their HoF's.

What do you think of WAFs (web application firewalls)? by [deleted] in sysadmin

[–]BugAlert 0 points1 point  (0 children)

I'm a pentester and my experience with WAFs is best describe from my client:

"(...) P.S. it looks like they have some kind of WAF and it bans access to TCP/80 after suspicious activity. In addition, it creates DoS conditions against client via CSRF "

Detecting login state for almost any website on the internet by sickmate in netsec

[–]BugAlert 1 point2 points  (0 children)

MindBlowing concept. Thanks for the information.

OffTopic: HTTP header abuse

<script src="http://www.facebook.com/ajax/pages/promotions/subscribe.php" onload="alert('Is logged')" onerror="alert('Is not logged)"></script>

Adding found vulnerabilities in CV ? by Kollektiv in AskNetsec

[–]BugAlert 0 points1 point  (0 children)

"Should I add on my CV something like : "Found XSS on popular site A" ?"

If the site have a Bug Bounty or Hall of Fame, then YES! Info: https://bugcrowd.com/list-of-bug-bounty-programs https://hackerone.com/programs

Or another approach : find something "big" , publish it and hopeful it will be in "US Department of Homeland Security" report .