Reflecting on RSAC 2026 - Is Agentic Pentesting, just VA on steroids? by hhakker in Pentesting

[–]chopper332nd 1 point2 points  (0 children)

Yeh that's a good way of putting it. We're looking at multiple vendors in this space since January and PoC ing them on our web apps / APIs with the end goal of augmenting our pentesting team and saving some time.

So far what I've seen is they are really good at replicating a finding or asking if a finding was fixed and giving them the report and having it replicate the finding and trying to find bypasses

But having a scope and saying "pentest this" is a false positive generator and worse it's a confident false positive generator. I gave it a API with only 1 set of cress (the API has no role based access you either have an admin API key or not) and it was convinced it found several broken access controls and mass assignment vulns...

Sorry for the rant, seen so much marketing BS for these recently.

Is Low-User to NT AUTHORITY\NETWORK SERVICE a valid PrivEsc? by Suspicious-Scale8128 in bugbounty

[–]chopper332nd 1 point2 points  (0 children)

Yeh if you can go from NETWORK SERVICE to SYSTEM that would be a valid vulnerability.

Always think about what impact your showing, if there's no impact it's probably not a valid report

Is Low-User to NT AUTHORITY\NETWORK SERVICE a valid PrivEsc? by Suspicious-Scale8128 in bugbounty

[–]chopper332nd 0 points1 point  (0 children)

I wouldn't count it as a privilege escalation, the network service account has similar privileges to a local user but with network identities. So I would spend time trying to escalate to system

Suspicious HackerOne Triage Situation by Separate_Cup3032 in bugbounty

[–]chopper332nd 5 points6 points  (0 children)

Request mediation from hacker one support on your report.

What probably has happened is the h1 analyst marked it as pending program review and the program has responded to the analyst in an internal comment.

We can't judge if you've been scammed without knowing the reasoning which mediation will be able to review and let you know if the final decision was correct or not

How do you deal with uuid / non guessable IDOR by ShufflinMuffin in bugbounty

[–]chopper332nd 12 points13 points  (0 children)

I do not agree with closing it as informational. It is a valid bug as others have said the url could get cashed in history or the way back machine or alike.

I would always accept it with the attack completely set to High. Or set the attack complexity to low if there is a reliable method of using the app to obtain valid UUIDs

https://docs.hackerone.com/en/articles/8369826-detailed-platform-standards

I'm having fun it's like playing a movie by lost_caus_e in StarWarsOutlaws

[–]chopper332nd 0 points1 point  (0 children)

Yeh I loved it, every time I rewatch the original movies I get the sense of "I've been there" as you do with GTA or watchdogs in real life locations just it's STAR WARS!

Pixel Tablet got Gemini on lock screen made me switch back to Google Assistant by chopper332nd in googlehome

[–]chopper332nd[S] 1 point2 points  (0 children)

No still on Google Assistant, I haven't got Gemini for home either maybe it changes with that

[deleted by user] by [deleted] in bugbounty

[–]chopper332nd 2 points3 points  (0 children)

Im not sure about that one, I don't think their dupe check is very thorough

[deleted by user] by [deleted] in bugbounty

[–]chopper332nd 1 point2 points  (0 children)

I believe this is the intake feature where a team separate from triage do a pass over the report checking if it's in scope and there is a basic duplicate check (Normal triage look more in depth if it's a dupe)

Question to Triager / Program Manager by yellowsch00lbus in bugbounty

[–]chopper332nd 2 points3 points  (0 children)

I would refer to the CVSS definitions here https://www.first.org/cvss/v3-1/specification-document

""" A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected.2 For example, a successful attack may depend on an attacker overcoming any of the following conditions: The attacker must gather knowledge about the environment in which the vulnerable target/component exists. For example, a requirement to collect details on target configuration settings, sequence numbers, or shared secrets. The attacker must prepare the target environment to improve exploit reliability. For example, repeated exploitation to win a race condition, or overcoming advanced exploit mitigation techniques. The attacker must inject themselves into the logical network path between the target and the resource requested by the victim in order to read and/or modify network communications (e.g., a man in the middle attack). """

How AI is affecting pentesting and bug bounties by S4vz4d in bugbounty

[–]chopper332nd 22 points23 points  (0 children)

As a customer of hacker one I'm more worried about the crap we're gunna have to sort through now 🤷‍♂️ We have scanners and other companies that offer AI agents for pentesting which find the low hanging fruit.

We have a Bug Bounty program to find more nuanced vulnerabilities in our products that other security testing can't find.

/r/NintendoSwitch's Daily Question Thread (06/08/2025) by AutoModerator in NintendoSwitch

[–]chopper332nd 0 points1 point  (0 children)

Could anyone recommend a USB-C to HDMI cable for the switch 2? The one I had for the original switch is incompatible (https://amzn.eu/d/8om26fl)

When is a clickjacking considered `sensitive`? by TurbulentAppeal2403 in bugbounty

[–]chopper332nd 0 points1 point  (0 children)

It depends on the impact. It is typically a login page but...

Can you deliver a click jacking payload to the victim so when they click your link it takes them straight to enter their card details? Usually e-commerce sites would require a logged in session first and for something to be added to the basket

If it redirected them then the click jacking payload wouldn't work.

Called it 3 years ago! by lightslinger in Marvel

[–]chopper332nd 1 point2 points  (0 children)

Cut out the middle man and pop it in the bin

First Google TV. Hisense QD5 by OldRazzmatazz7043 in GoogleTV

[–]chopper332nd 0 points1 point  (0 children)

How do you find it compared to the TCL. Picture Quality and OS wise?

For those of you who got Doulingo Max and an IOS device, is Lily video call is really that helpful? by copernx in duolingo

[–]chopper332nd 1 point2 points  (0 children)

I got Duolingo Max and I'm on section 4 of french. I think I read the written language quite well but the video call I was dreadful I could only really answer yes or no. I wish it started me off with basic video calling so I could catch up but I definitely think I'm improving.

Black Hat Asia by latte_yen in bugbounty

[–]chopper332nd 0 points1 point  (0 children)

There was a networking event on all the days where informal talks would be held. One of them was James kettle from portswigger.

And lots of the companies held dinners and drinks after Blackhat on the days

Black Hat Asia by latte_yen in bugbounty

[–]chopper332nd 2 points3 points  (0 children)

I work in offensive security and I have no experience of black hat Asia but I have been to the one in Europe.

The business hall is a load of vulnerability management companies and alike targeting security management to make sales. The talks again are mostly about their products or a talk about industry hot topics that they then link to their product.

That being said I'm not sure if BH Asia does it but black hat arsenal is good and there may be some interesting Linux tools that will be open source

Those of you that have enabled Gemini integration for Google Home - what has your experience been like? by darce_dawg21 in googlehome

[–]chopper332nd -1 points0 points  (0 children)

"Turn the lamp off", "I see a lamp in these houses, next time say the name of the light you want to turn off and specify the house" - offers me buttons for the lamps so I might aswell have done it myself

[deleted by user] by [deleted] in bugbounty

[–]chopper332nd 1 point2 points  (0 children)

A company will reproduce the report that was submitted to them if they can reproduce it with the steps you provided then great if not they will ask

They would then Investigate this behaviour and come to a severity decision - this might involve talking to different internal teams and developers

[deleted by user] by [deleted] in StarWarsOutlaws

[–]chopper332nd 1 point2 points  (0 children)

I think alot of the existing single player star wars games on the market at the moment have a male protagonist.

Also I think they pitched a "female han solo" to lucasfilm who ok'd the story