๐Ÿ‡ท๐Ÿ‡ด cristi Profile Banner
๐Ÿ‡ท๐Ÿ‡ด cristi Profile
๐Ÿ‡ท๐Ÿ‡ด cristi

@CristiVlad25

41,424
Followers
170
Following
2,189
Media
11,199
Statuses

Joined November 2013
Don't wanna be here? Send us removal request.
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
How to learn reverse engineering fast. A Practical approach. (thread)
50
368
1K
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
5 tips on how I used Burp Pro in my 85+ pentests in 2022: (thread)
57
358
1K
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
12 days
The Burp Suite Deep Dive course is now fully uploaded and completely free on YouTube. Monetization is turned off so you should have an ad-free experience. Feel free to spread the word. #pentesting #appsec #cybersecurity #bugbounty #infosec
17
346
1K
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
4 years
In light of current events, I open my course Python for Pentesters. Get it free in the next 24h and have lifetime access. Inspired by @thecybermentor I want you to use this knowledge for the Good! Leave a review, it helps me. Coupon: FREEEDUCATION Link:
Tweet media one
105
416
949
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
You cannot be an expert hacker in everything. #cybersecurity is a vast field. Let's say you wear an offensive hat. This is a vast field in itself. Choose one topic, say "application security" (I'm also into this). Hereโ€™s my best approach to skill-up fast: 0/n
33
178
947
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
2023 Hacker's Guide: How to Break into Pentesting and AppSec. (thread)
38
244
910
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
In my pentests and appsec assessments, if I get stuck, these are two checklists that help me going: 1. by @Six2dez1 : 2. by @e11i0t_4lders0n : They are very extensive!
42
296
876
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
The most frequent vulns I found in 80+ pentests in 2022. (thread)
Tweet media one
16
199
834
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
SSRF via PDF? Now made easy. (thread)
27
270
835
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Top Python Libraries used by Hackers (thread)
25
198
787
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Must-have checklists I use in my #pentesting assessments. (thread)
57
280
789
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Pentesters, what do you write in the report when there are no findings?
163
62
620
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Privilege escalation in Windows using 4 tools for red teamers and pentesters. (thread)
20
140
564
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
1 year
Now you can use ChatGPT and GPT4 in your terminal, as simply as: gpt "<your prompt>"
Tweet media one
12
111
536
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
If PUT is not allowed, you try to override with the following headers: X-HTTP-Method-Override: PUT X-Method-Override: PUT - by @Six2dez1
17
141
507
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
extremely useful when pentesting APIs.
Tweet media one
3
142
476
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
I don't do memes, but this one is the best I've seen so far
Tweet media one
5
112
451
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Paid to Hack! How much money can you make in cybersecurity? (thread)
15
87
446
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
really useful for when doing code reviews. via @vickieli7 and @nostarch
Tweet media one
6
123
450
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
1 year
๐Ÿš€๐Ÿ”’Exciting news! SecGPT is now LIVE! Trained on thousands of cybersecurity reports, SecGPT revolutionizes cybersecurity with AI-driven insights.๐Ÿ‘‡
Tweet media one
21
94
430
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 months
Advanced IDORs - 9 Techniques by @intigriti : 1. Exploiting Basic IDORs How to: Modify a predictable numeric ID in the request URL or parameters. Example: GET /user/email?userId=1002 (change userId to another value). 2. Exploiting IDORs via Parameter Pollution How to: Inject
Tweet media one
2
138
436
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Often times to simplify my work I build scripts.๐Ÿ‘‡ I recently discovered katana by @pdiscoveryio . And I turned this: katana -d 5 -c 50 -p 20 -ef "ttf,woff,svg,jpeg,jpg,png,ico,gif,css" -u < https://tld> -cs "regex-to-restrict-to-tld-and-subdomains" into this: kata <tld>
Tweet media one
8
93
429
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
1 year
- stopped using ffuf a while ago - switched to ferox - I often config based on the target, but - here's my mostly-used config Ferox is more reliable and gives me fewer false positives. Plus, I like how it dynamically adapts to the target, especially for rate-limits.
Tweet media one
23
73
407
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
If you're an ethical #hacker , these are highly sought-after skills: 1. Knowledge of Networking: Understanding the fundamentals of network architecture, protocols, and technologies is essential for an #ethicalhacker . (thread)
15
70
382
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Today I learned that the command "w" in the terminal shows who is doing what. Pretty neat, as someone who has been using Linux for over 15 years now. Thanks @RealTryHackMe .
Tweet media one
12
31
393
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
in cybersecurity, bash skills are like superpowers. I'd dare to say, more important than python.
16
31
384
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
4 years
I've created a playlist of 35 videos for those beginning in Bug Bounty Hunting and Penetration Testing. Check it out and share it around! #bugbounty #pentesting #penetrationtesting #bugbountytips #bughunting #python #cybersecurity #ethicalhacking
4
150
375
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
4 years
The majority of tweets are bragging about successes and how you got $$$ for your report. That's often very toxic for beginners and it can be demotivating. In September I got a lot of reports rejected/dupes and my biggest bounty was $100. But I sure learned a lot. #bugbounty
19
50
376
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
All of my top tips on #hacking now available as blogs. Read below. (thread)
14
118
370
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Next generation cyber-attacks via AI models: (thread)
7
87
367
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
Leak size: 997 GB Document count (elastic): 1.6+ billion Found & reported: December 26, 2021 Mobile app with 100+ million installs on Android. Massive leak of private user activity and videos. Reported and in the process of informing @GoogleVRP too
Tweet media one
Tweet media two
13
99
362
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
where do you get your #cybersecurity news from?
73
48
342
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
From ethical hacking to cybersecurity management, these 9 careers are perfect for you, the aspiring cyber-expert! (no bug bounty involved). 1. Cybersecurity Analyst 2. Penetration Tester 3. Cloud Security Engineer 4. Malware Analyst 5. DevSecOps Engineer ... (thread)
12
76
327
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
SQLi + XSS + SSTI: '"><svg/onload=prompt(5);>{{7*7}} (another great one by @Six2dez1 )
8
84
335
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
1 month
How I configure Autorize in Burp Suite 90% of the time, to identify IDOR/BOLA: - Uncheck Ignore 304/204 (they can often uncover issues) - Check unauthenticated - (the first 2 filters are default) - Filter: Scope items only - Filter: Ignore OPTIONS requests #pentesting #appsec
Tweet media one
6
68
336
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Exfiltrating AWS Credentials via PDF Rendering of Unsanitized Input ๐Ÿ‘‡
Tweet media one
7
49
315
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
11 months
One (out of hundreds) way to use GPT4-V to help when pentesting. #appsec #cybersecurity #pentesting #infosec
Tweet media one
8
47
298
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
How to learn Python fast, in 3 steps: (thread)
10
52
299
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
5 sources to learn smart contract hacking by example. (thread)
10
88
298
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
when you understand how much money you can make in cybersecurity and ethical hacking and that it has nothing to do with bounties, you'll not even look at bug hunting, except for fun maybe...
19
27
288
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
These 5 tools and techniques have completely transformed my pentesting and appsec assessments: (thread)
16
68
291
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
The infrastructure pentest, in six parts: 1 - Intelligence Gathering 2 - Vulnerability Analysis 3 - Exploitation 4 - Post Exploitation 5 - Reporting 6 - Configuration Review 0/n
6
81
284
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
How I do subdomain enumeration by aggregating multiple tools in a bash script. The script contains the following tools: (thread)
12
72
285
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
Bug bounty can't be a full time job for at least 90% of hackers from med/high income countries. You worship the 1-2% making $100k+/y but fail to see the millions of hackers (the 90%+) stuck in the beginner hell. In pentesting you can easily go $100k+/y - all the burnout/drama.
19
34
270
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Look for these file extensions in your pentests and appsec assessments. (thread)
17
82
270
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
4 years
Now's your chance to develop Python skills for your cyber practices. Take my course for free. And share this to reach more people who can't afford to pay. Limited to the next 40 hours. Course link: Code: GROWASKILL
11
101
267
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
How to find uncommon bugs via manual testing. (thread)
10
71
264
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
5 methods to bypass authentication. via @AnonY0gi (thread)
8
63
257
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
got my first RCE, on two targets. after 2 years of doing bug bounties.
14
7
254
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
4 years
If elite hackers reveal their tactics, there would be no elite. l33t = years of hard work + 0 immediate gratification Therefore, few make it. Say NO to one-liner orgasms and to the reemerging cult of the script kiddie.
9
43
251
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
4 years
PRO tip: Stop doing beginner courses and stop copying one liners. You'll only get duplicates. Instead, start indepth studying documentations. Like AWS infrastructure, for example.
4
32
252
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
When you work on a target and you see copyright 2005, must be something in there, or must be super safe? What's the first thing you'd try?
Tweet media one
60
14
247
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
When you recon, keep in mind there's more to dorking than Google.
Tweet media one
5
64
248
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
SSH local port forwarding, explained to humans: ssh -L [local_address:]local_port:remote_address:remote_port [user@]ssh_server
5
41
245
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
I'm also going through this book by @and1hof
Tweet media one
6
16
243
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
JWT Attack Playbook: great resource for JWT attacks @ticarpi :
3
60
231
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
The 4 Pentesting Learning Paths by @RealTryHackMe . (thread)
7
51
225
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
How about some AI straight into your terminal? Just say: gpt3 <your_command>. (thread)
Tweet media one
9
49
226
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
damn, the level of sophistication that attacks can reach. I didn't know this, thanks @RealTryHackMe (thread)
Tweet media one
8
49
225
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Let's do it again... Up for grabs is a @RealTryHackMe subscription. How to participate: - follow me @cristivlad25 and retweet this. If and when this tweet reaches a total of 400 likes and retweets in 5 days or less, we'll randomly select a winner.
Tweet media one
17
173
215
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
6 months
If you're pentesting web apps, my version of WSTG Checklist by @owasp will give you hundreds of test cases and how to test. This is very useful when your client asks you to test against a methodology. #pentesting #appsec #cybersecurity #infosec
2
60
224
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
How to Approach IDOR hunting? via @InonShkedy ๐Ÿ‘‡
14
63
220
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
How to learn malware analysis, by practicing with real malware samples. In 2 steps, by @HackerSploit . Not beginner friendly. (thread)
4
65
218
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
Clarity will get you a long way. I hate XSS,SQLI,SSRF,XXE,CSRF. I don't look for them. I enjoy logic flaws, code review, bypasses & misconfigs. I focus on them. #cybersecurity #focus #bugbounty
6
22
208
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
1 year
You can add "/vendor/credentials" to your wordlist.
Tweet media one
1
34
211
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
4 years
Python is still one of the most 'spoken' cyber languages out there. Use PYTHONISTA2021 to learn for FREE with my Python Basics course. Tell others. Course link: #python #pentesting #cybersecurity #bugbounty
11
86
197
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
6 under-the-radar resources to master authentication vulnerabilities: 1. OWASP Auth Cheat Sheet 2. SANS ISC 3. NIST Special Publication 800-63B 4. CERT Vulnerability Note Database 5. IETF RFCs on Authentication Protocols 6. OAuth 2.0 Security Best Practices (thread)
2
56
196
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
4 years
Mobile Security Testing Guide 2020 by the amazing people @owasp and @OWASP_MSTG . Learn this by heart if you want to hack mobile. #bugbounty #bugbountytips #mobilehacking #androidsecurity #bughunting
0
79
192
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
This is a well-crafted checklist for when you perform a pentest, by @e11i0t_4lders0n .
2
73
190
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
Look for #ssrf in: - webhooks - file upload via URL, - document and image processors, - link expansion, and - proxy services via @vickieli7
3
56
186
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
5 years
I've been through a lot of hurdle to keep this free. So, if you want to learn how to develop with Python for cybersecurity, go take my course Developing Ethical Hacking Tools with Python on @cybraryIT . Oh, and do me a favor, share around!
10
81
186
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
4 years
Don't do beginner hacking courses, learn networking. You will understand how 'things' work at a fundamental level. Hacking courses get you very distilled knowledge - with someone else's filters and biases applied. A good book is Internet Infrastructure by Rob Fox.
4
22
188
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
5 months
My current Burp extensions. What are yours? #pentesting #appsec #cybersecurity #bugbounty
Tweet media one
10
30
191
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
11 months
My recon course, first published in 2020, is going to be free on YouTube. Keep an eye on the playlist of the course, and spread the word. #pentesting #appsec #infosec #bugbounty First video is available now:
4
49
185
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
What I Learned Exploiting an SSRF bug, by Raymond Lind. (thread)
4
45
181
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
4 years
Why hunt for business logic? (never-again-duplicates) 1. Security scanners can't identify them. 2. WAF can't defend from them. 3. IDS can't detect them. More:
2
68
179
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
JavaScript for Hackers, posted by Joas Antonio on LinkedIn.
5
45
178
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
1 year
Boost your pentesting and bug bounty game with SecGPT's AI insights from thousands of online security reports. I've asked it for some XXE payloads found in the reports.
Tweet media one
5
39
175
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Tweet media one
3
43
176
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
1 year
If you want to become really good really fast, don't take courses, unless you're a beginner. Here's what I do daily. On a very specific subject (say Access Controls): 1. Read reports/writeups 2. Study exploits. ChatGPT4 with COT and other prompt engineering techniques can take
2
36
172
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Here's a 5 bullet point methodology for finding XSS. I don't like XSS but I must look for it as part of the pentests I perform for clients.๐Ÿ‘‡
6
39
171
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
3 years
better fuzzing: 1. visit the url 2. view-source 3. find directories manually 4. fuzz directories
6
21
169
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
#giveaway time! 10 FREE coupons to Burp Suite Deep Dive. Rules are simple: - follow me @CristiVlad25 and retweet this. If and when this tweet reaches a total of 400 likes & retweets in 5 days or less, we'll randomly select the winners. #pentesting
15
126
159
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
1 year
(unpopular opinion) In #bugbounty , those who make the most money are not necessarily the best in terms of skills (hardly ever). They're definitely the best at making money. By: - access to unpopulated private programs - milking CVEs from many programs - favoritism on some
11
15
167
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
One of the best explanations of the oauth flow, with examples. And how it can be abused.
0
54
172
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
2 years
Ultimate GraphQL Recon. (thread)
Tweet media one
9
70
170
@CristiVlad25
๐Ÿ‡ท๐Ÿ‡ด cristi
1 year
All my paid courses on udemy are free to the first 1000 people with the coupon code FREEMAY. I wanted to make them free forever but @udemy doesn't allow you to change courses longer than 2 hours to the free tier. A major BS for no reason if you ask me. YW. #pentesting #appsec
27
28
168