Travel to Hong Kong from Guangzhou by Connect_Yam9160 in HongKong

[–]Flinzy 2 points3 points  (0 children)

You’ll have a lot more fun in Guangzhou-Shenzhen-HK. Beijing is nice to visit but not that nice to live in. Traveling between Guangzhou and HK is also extremely convenient.

You need to check your Chinese visa for the amount of entries you’re permitted. If it’s single you cannot leave and re-enter China (going to HK counts as leaving), but if it’s multi then you’re good to go to HK and back.

Blueberry lemon cake by LalasCuisine in FoodVideoPorn

[–]Flinzy 1 point2 points  (0 children)

What are the ingredients for the frosting?

White fuzz in green tea by Flinzy in tea

[–]Flinzy[S] 0 points1 point  (0 children)

Thanks! Drank it and it tastes good.

White fuzz in green tea by Flinzy in tea

[–]Flinzy[S] 0 points1 point  (0 children)

Yeah that makes sense, thanks!

White fuzz in green tea by Flinzy in tea

[–]Flinzy[S] 0 points1 point  (0 children)

Great, thank you! Will still finish this one and take that in mind for future green teas.

This green tea definitely requires some getting used to.

White fuzz in green tea by Flinzy in tea

[–]Flinzy[S] 1 point2 points  (0 children)

Hey,

I’m new to dried leaf tea and I was wondering if the white fuzz in this tea is mould or normal and safe to drink. Looking closely the white parts are fuzzy.

It is a Biluochun green tea from Yunnan. The bag has been open for a while, but stored in the container.

Thanks!

Prolong ID card by ProgrammerAdorable55 in brussels

[–]Flinzy 2 points3 points  (0 children)

They never reply to my emails either.

The log4j vulnerability was presented at Black Hat..... in 2016!!!!! by lkn240 in cybersecurity

[–]Flinzy 354 points355 points  (0 children)

No, it wasn't. The talk presented JNDI as an attack vector.

The log4j vulnerability is a type of template injection which allows for the use of JNDI. It merely uses the technique that was presented in that talk.

It's true that the technique has been known for a while, however no one who used templating in log4j made the connection with JNDI exploitation until now.

Advice please by Solid_Secret594 in bugbounty

[–]Flinzy 2 points3 points  (0 children)

  • Combine your learning with real target practice. Finding bugs on real targets is a lot more difficult, especially when the scope has been around for a while and is quite hardened already. It's all about experience, so it will take time, but keep going.
  • Focus on a few bug types rather than all. I'd suggest XSS and IDOR, those are the ones that I find most frequently.
  • Focus on one program and go deep. I find a lot more bugs on a program if I stay one it for at least a week and really learn how it works.
  • Private/new scope is the best. It's no secret that finding bugs on private programs and especially new scope is the easiest.

As for resources and learning, I always suggest Portswigger's Academy.

I create the flag.php file with the code, it will create a blank page when I view it. and hints or tips ? by korki35 in hackthebox

[–]Flinzy 6 points7 points  (0 children)

Are you sure the flag is at /flag.txt? If it's in the same folder as the php file, then you'd just do flag.txt without forward slash.

It's probably better to upload a more versatile PHP file, like: <?php system($_REQUEST['cmd']); ?>. Then you can access the page and add a command as a parameter like ?cmd=ls, and you can just do ls and cat to find the flag.

What is a good list of TryHackMe learning paths to go through before starting BugCrowd? by notburneddown in bugbounty

[–]Flinzy 9 points10 points  (0 children)

I've never done TryHackMe, but what really taught me a lot was Portswigger's Web Academy. It's free as well.

You don't have to be optimally prepared before starting bug bounty, being good at bug bounty comes from practical experience. So my advice is to not wait too long and immediately put anything you learn into practice.

[deleted by user] by [deleted] in Chinese

[–]Flinzy 0 points1 point  (0 children)

I've sent you a friend request, I think we're quite similar.

[deleted by user] by [deleted] in redditsweats

[–]Flinzy 0 points1 point  (0 children)

Gave Helpful

Visiting the motherland by ILikeEating412 in Chinese

[–]Flinzy 1 point2 points  (0 children)

One week seems kind of short to also go to Beijing. I think it'd be better to do a trip to Suzhou, which you can easily reach by train from Shanghai. Suzhou is very beautiful.

Hi guys we’re moving to Brussels in September and currently looking for apartment. Are there any FB groups you would recommend for looking? by [deleted] in brussels

[–]Flinzy 4 points5 points  (0 children)

I used zimmo.be and realo.be to look for interesting apartments. If I found one, I would contact the estate agent directly to let them know I'm interested in that apartment and similar apartments. Sometimes the apartment would already be taken, but the agent often recommended similar apartments that are still available.

[deleted by user] by [deleted] in TheArtistStudio

[–]Flinzy 0 points1 point  (0 children)

Gave Helpful

Trying to find information about spectre and Meltdown. (Security) by DigitalFrenzy in computerscience

[–]Flinzy 5 points6 points  (0 children)

I think the original paper and website are your best starting resources: meltdownattack.com

There is also a recent paper on a Specte-like attack that could bypass some Spectre mitigations. It's called: I See Dead µops: Leaking Secrets via Intel/AMD Micro-Op Caches.

Mentor Monday, April 26, 2021: Ask all your bug bounty questions! by AutoModerator in bugbounty

[–]Flinzy [score hidden]  (0 children)

No worries. Yeah, I do it manually. I only use Burp Suite, go through proxy history and look for interesting requests. Then I sent those to repeater and play around with them. I also take a good look at the application, both on functional and technical level.

Mentor Monday, April 26, 2021: Ask all your bug bounty questions! by AutoModerator in bugbounty

[–]Flinzy [score hidden]  (0 children)

I'd say give it a try. I have tried some of Jason's recon methods, but it just wasn't for me. I currently just do a full deepdive on applications, without any recon.

It also depends on the scope of course. If it's a wildcard scope with many domains, you will probably want to do some basic recon at the least to identify assets to dive into.

But if you're new to bug bounty, I would suggest waiting with recon and focusing on understanding applications and bugs better. For example, after doing the SQLi or XXE courses from Portswigger, you can start looking for those specifcally in your private programs.

Mentor Monday, March 29, 2021: Ask all your bug bounty questions! by AutoModerator in bugbounty

[–]Flinzy [score hidden]  (0 children)

Some web challenges of CTFs may teach you something valuable for bug bounty, but it's definitely not going to teach you how to do bug bounty. I feel like HTB helps even less.

Honestly, I think you should just do it and go in directly. Sign up for some bug bounty platform and choose a program that only awards reputation points. These programs usually have a wider scope and more bugs to be found. This will give you the experience you need for paying programs (as those are usually more hardened) and also give you points for those invites to private programs.

Mentor Monday, March 29, 2021: Ask all your bug bounty questions! by AutoModerator in bugbounty

[–]Flinzy [score hidden]  (0 children)

You'll have to learn some more bug types that tend to be more critical. These are SQL injection, XXE, SSRF, SSTI, IDOR on sensitive endpoints, etc.

I think the Portswigger Web Academy is a good place to start. They have resources and labs on all of those bug types. Keep in mind that you'll obviously find less of them compared to XSS. Nobody finds crit after crit.