Tuan Anh Nguyen 🇻🇳 (@haxor31337) 's Twitter Profile
Tuan Anh Nguyen 🇻🇳

@haxor31337

28 y/o Bug Bounty Hunter and Red Teamer at Viettel Cyber Security.
Brand Ambassador @Hacker0x01 - Researcher Spotlight @Bugcrowd

ID: 1018903932

calendar_today18-12-2012 03:38:40

2,2K Tweet

13,13K Followers

2,2K Following

shubs (@infosec_au) 's Twitter Profile Photo

Our security researcher hashkitten found one of the most critical exploit chains in the history of Assetnote. Affecting 40k+ instances of ServiceNow, we could execute arbitrary code, access all data without authentication. You can read our blog here: assetnote.io/resources/rese…

Our security researcher <a href="/hash_kitten/">hashkitten</a> found one of the most critical exploit chains in the history of <a href="/assetnote/">Assetnote</a>. Affecting 40k+ instances of ServiceNow, we could  execute arbitrary code, access all data without authentication. You can read our blog here: assetnote.io/resources/rese…
HackerOne (@hacker0x01) 's Twitter Profile Photo

In our latest blog, we spoke with hacker Juan Francisco Bolívar about his recent discovery of an impactful GraphQL vulnerability in an e-commerce application API. See how he says other organizations can avoid this bug: bit.ly/46utux2 What have you hacked recently? 🤔

In our latest blog, we spoke with hacker <a href="/JFran_cbit/">Juan Francisco Bolívar</a> about his recent discovery of an impactful GraphQL vulnerability in an e-commerce application API. 

See how he says other organizations can avoid this bug: bit.ly/46utux2

What have you hacked recently? 🤔
Tuan Anh Nguyen 🇻🇳 (@haxor31337) 's Twitter Profile Photo

Congrats all teams 👏 It is an amazing event with almost all the top hackers and influencers in the bug bounty community worldwide. I see a lot of geniuses and young people here 🫡 It is exactly a World Cup of white hat hackers 💪

mbg (@mbrg0) 's Twitter Profile Photo

we got an ~RCE on M365 Copilot by sending an email by ~RCE I mean full remote control over its actions - search for sensitive content (sharepoint, email, calendar, teams), execute plugins and outputs - bypass DLP controls, manipulate references, social engineer its users on our

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! blog.orange.tw/2024/08/confus… Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code

Tuan Anh Nguyen 🇻🇳 (@haxor31337) 's Twitter Profile Photo

I see a lot of companies public VDP recently on bug bounty platforms although they already run private program in a long time with same scope. I feel like the researcher is being cheated of their efforts and only getting a thank or HoF in return🥲 What do you think about this?

evan (@stargravy) 's Twitter Profile Photo

This was the last thing I found / worked on while still at Tenable. A fun SSRF via Microsoft Copilot Studio leading to a critical info disclosure (CVE-2024-38206). Thanks to Jimi Sebree and the team for helping get this one out. tenable.com/blog/ssrfing-t…

H4x0r.DZ (@h4x0r_dz) 's Twitter Profile Photo

“HackerOne employee improperly accessed vulnerability data of customers to re-submit duplicate vulnerabilities to those same customers for personal gain.” hackerone.com/reports/1622449

H4x0r.DZ (@h4x0r_dz) 's Twitter Profile Photo

CVE-2024-43425 : Moodle remote code execution via calculated question types payload : (1)->{system($_GET[chr(97)])} then ?a=<cmd> blog.redteam-pentesting.de/2024/moodle-rc…

Th3g3nt3lman (@th3g3nt3lman) 's Twitter Profile Photo

thanks shubs for telling the ugly truth, everybody is putting few scripts to gather data, few payloads, create nice dashboards and graphs, then sell it as state of art next generation ASM that is shit to what a core ASM looks like. youtube.com/watch?v=47TIPt… #ASM #BugBounty