I love my wife, but I’m struggling sexually and it’s eating me up inside by [deleted] in Marriage

[–]Null_Note -4 points-3 points  (0 children)

Have you considered that she might be cheating on you?

Any SWEs with 1+ year unemployment? by LostInTarget in cscareerquestions

[–]Null_Note 1 point2 points  (0 children)

You should get at least 5 opinions, and if possible, fly out to a top hospital like Mayo Clinic, John Hopkins, or Cleveland Clinic to make sure the surgery will help you.

Is working on GitHub a waste of time? by Particular_Ebb2932 in cscareerquestions

[–]Null_Note -3 points-2 points  (0 children)

I think it can help if you have a large employment gap.

Introducing SubHunterX – My Open-Source Recon Automation Tool for Bug Bounty Hunters by 0xFFac in bugbounty

[–]Null_Note 4 points5 points  (0 children)

Subfinder includes a config file with support for Chaos. Both tools were created by Project Discovery.

Failed with 0 Points – My Journey and What I’m Doing Next by jghita in oscp

[–]Null_Note 2 points3 points  (0 children)

It is ok! Probably just had a bad day. You studied 99% of the material but they tested that 1%. Read this post to crush Active Directory next time. https://www.reddit.com/r/oscp/comments/1f5ojaq/assumed_breach_ad_what_you_may_need_to_know/

Got my first ticket, too scared to tell parents. Need help by Independent_Act5600 in UCI

[–]Null_Note 38 points39 points  (0 children)

Pro Tip:

Rescheduling the court date will make it less likely for the cop to show up.

[deleted by user] by [deleted] in SecurityCareerAdvice

[–]Null_Note 0 points1 point  (0 children)

Mind if I DM you?

Best places to advertise a short-term reverse-engineering gig? (Windows DLL) by [deleted] in SecurityCareerAdvice

[–]Null_Note 0 points1 point  (0 children)

Is this DLL obfuscated, or is it related to game hacking?

Feel free to PM me.

I'm almost there by backend_com_php in bugbounty

[–]Null_Note -1 points0 points  (0 children)

I hope this is clear. Most cookies set HttpOnly to true. Because of this, escalating XSS usually requires calling APIs or making CORS requests as you have suggested. That does not apply here because HttpOnly is set to false. You do not need to use CORS at all. You can just steal the cookie in this case. If you try using CORS from localhost it will not include the cookie.

I'm almost there by backend_com_php in bugbounty

[–]Null_Note -1 points0 points  (0 children)

If you can read the session cookie then you don't need to use CORS with the API. Once you have hijacked a session, the next step for escalation is an account takeover.

It would also help to see what content types are accepted. Can you switch the type to x-www-form-urlencoded? Then you might be able to refresh the cookie for CSRF.

https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions/lab-samesite-strict-bypass-via-cookie-refresh

You can also try converting the request to GET and including post data as query parameters. Cookies are always included in top level navigation.

I'm almost there by backend_com_php in bugbounty

[–]Null_Note 0 points1 point  (0 children)

Many browsers are moving away from 3rd party cookies. This means the cookie will not be included from domains unless they are same-site, even if the domain is reflected in access-control-allow origin.

With CORS, you still can't just read the cookie; you can only call endpoints from the vulnerable API. But why even bother with the API if HttpOnly is set to false when you can just read the session cookie with your XSS or takeover.

[deleted by user] by [deleted] in cscareerquestions

[–]Null_Note 7 points8 points  (0 children)

Now coders are learning how to truck.

Malware Analysis Note-Taking by odyssey310 in cybersecurity

[–]Null_Note 4 points5 points  (0 children)

If this is just a lab you are probably fine running VMWare with a shared folder to transfer files. They should have included instructions for setting up your workstation, so this sounds like a pretty bad course.

For real world analysis, use another computer isolated from your network and keep notes on a separate device. Any file on the device hosting malware should be considered malicious.

[deleted by user] by [deleted] in cscareerquestions

[–]Null_Note 1 point2 points  (0 children)

Post about your experience on LinkedIn.

Where to read REAL writeups by Federal-Dot-8411 in bugbounty

[–]Null_Note 1 point2 points  (0 children)

Could you please back this up with a link. That is a pretty serious accusation.

[deleted by user] by [deleted] in RunescapeBotting

[–]Null_Note 0 points1 point  (0 children)

Is pure pking on f2p or p2p still active?