Karim Habeeb Profile Banner
Karim Habeeb Profile
Karim Habeeb

@NoRed0x

2,601
Followers
357
Following
35
Media
145
Statuses

Offensive Security Researcher @Resecurity

Joined August 2020
Don't wanna be here? Send us removal request.
@NoRed0x
Karim Habeeb
15 days
Add the folder 'home/000~ROOT~000/' to your wordlist, and you might discover some juicy data. Enjoy!" #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
14
148
833
@NoRed0x
Karim Habeeb
1 year
add this file to your wordlist `.gitlab-ci.yml` , enjoy its contain a database username and password #bugbounty #bugbountytips #bugbountytip
Tweet media one
20
188
812
@NoRed0x
Karim Habeeb
2 years
bypass alert ==> [alert][0].call(this,1) #bugbounty #bugbountytips #bugbountytip
Tweet media one
Tweet media two
19
137
556
@NoRed0x
Karim Habeeb
1 year
Add /api/.env to the wordlist, and maybe you will have access to dotenv file environment that leads to exposing SMTP credentials and AWS access key , secret key #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
9
114
418
@NoRed0x
Karim Habeeb
3 months
Add 'app/etc/local.xml' to the wordlist, and maybe you will get juicy data. Enjoy! #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
7
74
413
@NoRed0x
Karim Habeeb
1 year
wordpress-wpconfig Sensitive Data Exposure: Check for endpoint maybe you will get juicy data. enjoy #bugbounty #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
9
93
382
@NoRed0x
Karim Habeeb
1 month
Add 'app/config/config.local.neon' to the wordlist, and maybe you will get juicy data. Enjoy! #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
6
38
373
@NoRed0x
Karim Habeeb
1 year
Files Containing Juicy Info inurl:"/.vscode/sftp.json" #bugbounty #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
2
61
357
@NoRed0x
Karim Habeeb
6 months
If you find Web frameworks like Symfony, add '/app_dev.php/_profiler/open?file=app/config/parameters.yml' to the wordlist, and you may get juicy data. Enjoy!" #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
4
94
353
@NoRed0x
Karim Habeeb
28 days
Add '/_vti_pvt/service.pwd' to the wordlist, and maybe you will get juicy data. Enjoy! #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
6
44
302
@NoRed0x
Karim Habeeb
9 months
Add '' to the wordlist, and maybe you will get juicy data. Enjoy! #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
4
55
275
@NoRed0x
Karim Habeeb
2 years
DB credentials are stored in the file wp-config.php.old.  #bugbounty #bugbountytip
Tweet media one
13
50
262
@NoRed0x
Karim Habeeb
8 months
Add '' to the wordlist, and maybe you will get juicy data. Enjoy! #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
1
44
267
@NoRed0x
Karim Habeeb
1 year
wp-config backup Sensitive Data Exposure: Check for `wp-config.php.bak` endpoint maybe you will get juicy data. enjoy #bugbounty #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
6
58
253
@NoRed0x
Karim Habeeb
7 months
Add 'local_settings.py' to the wordlist, and maybe you will get juicy data. Enjoy! Created a nuclei template for it #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
2
45
247
@NoRed0x
Karim Habeeb
4 months
Add '.ftpconfig' to the wordlist, and maybe you will get juicy data. Enjoy! #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
2
42
240
@NoRed0x
Karim Habeeb
1 year
Sensitive Data Exposure: Check for config.php~ endpoint maybe you will get juicy data. enjoy #bugbounty #bugbountytips #bugbountytip #cybersecurity #ethicalhacking #database
Tweet media one
6
45
224
@NoRed0x
Karim Habeeb
1 year
Docker-Based Sensitive Data Exposure: Check for docker-compose.yml endpoint maybe you will get juicy data. enjoy #bugbounty #bugbountytips #bugbountytip #cybersecurity #ethicalhacking #Docker
Tweet media one
4
34
219
@NoRed0x
Karim Habeeb
1 year
DB credentials are stored in the file `config/const.DB.php.bak`,enjoy #bugbounty #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
6
48
218
@NoRed0x
Karim Habeeb
9 months
Add '' to the wordlist, and maybe you will get juicy data. Enjoy! #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
3
41
214
@NoRed0x
Karim Habeeb
11 months
Sensitive Data Exposure: Check for the `` endpoint maybe you will get juicy data. enjoy #bugbounty #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
2
39
208
@NoRed0x
Karim Habeeb
2 years
Sensitive Data Exposure (Github recon) SMTP username and password #bugbounty #bugbountytips #bugbountytip
Tweet media one
9
9
125
@NoRed0x
Karim Habeeb
5 months
Add 'master.passwd/master.passwd.txt' to the wordlist, and you might uncover some juicy data. Enjoy! #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
2
25
127
@NoRed0x
Karim Habeeb
5 months
Add 'servudaemon.ini' to the wordlist, and maybe you will get juicy data. Enjoy! Created a nuclei template for it: #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Tweet media one
1
25
121
@NoRed0x
Karim Habeeb
2 years
Sensitive Data Exposure (JS Recon) "accesskey:" and "secretkey:" #bugbounty #bugbountytips #bugbountytip #AWS
Tweet media one
4
21
108
@NoRed0x
Karim Habeeb
9 months
Add .env to the wordlist, and you may gain access to the dotenv file environment, potentially exposing DB credentials. #bugbountytips #bugbountytip #cybersecurity #ethicalhacking #
Tweet media one
3
19
109
@NoRed0x
Karim Habeeb
1 year
bash_history Sensitive Data Exposure: Check for `/.bash_history` endpoint maybe you will get juicy data. enjoy #bugbounty #bugbountytips #bugbountytip #cybersecurity #ethicalhackin
Tweet media one
3
22
103
@NoRed0x
Karim Habeeb
2 years
Sensitive Data Exposure (JS Recon) "accessToken:" and "oauth_token:" #bugbounty #bugbountytips #bugbountytip #AWS
Tweet media one
9
10
98
@NoRed0x
Karim Habeeb
1 year
if you are interested in network penetration testing or red teaming, I explained office persistence with cobalt strike, enjoy #redteam #penetrationtesting
0
43
92
@NoRed0x
Karim Habeeb
2 years
if you are interested in network penetration testing or red teaming, I explained most of Kerberos attacks, enjoy part 1 ===>Kerbroasting
4
13
58
@NoRed0x
Karim Habeeb
3 years
Alhamdulillah Today I'm starting a new journey at SRT member @synack
Tweet media one
3
0
43
@NoRed0x
Karim Habeeb
1 year
if you want to test SMTP credentials use the website
1
7
32
@NoRed0x
Karim Habeeb
2 years
if you are interested in network penetration testing or red teaming I collected most of the commands used in AD domain enumeration in three parts, enjoy part 1 ==>
2
9
28
@NoRed0x
Karim Habeeb
15 days
@_bahgat_ @abhinav31103851 search for sensitive file| wordlist | #bugbountytips like this
Tweet media one
1
1
18
@NoRed0x
Karim Habeeb
3 years
after two year at @hackthebox_eu i have finished 100 machine i have great experience from htb in the network penetration testing
Tweet media one
1
0
15
@NoRed0x
Karim Habeeb
2 years
Alhamdulillah, I'm glad to announce that I have passed the Web Application Penetration Testing Extremely exam, thanks to @eLearnSecurity for the great course and content Thank you @Resecurity for your support
Tweet media one
4
0
15
@NoRed0x
Karim Habeeb
2 years
if you are interested in network penetration testing or red teaming, I explained the attack using a scf file to gather hashes and if you want to try this attack,htb machine (Driver) #redteam #penetrationtesting
0
4
16
@NoRed0x
Karim Habeeb
15 days
@abhinav31103851 I collect some endpoints manually from sources such as Twitter, h1 reports, WaybackURLs, etc.
2
0
13
@NoRed0x
Karim Habeeb
2 years
Alhamdulillah, I'm glad to announce that I have passed the eLearnSecurity eCPPT Certified Professional Penetration Tester exam, thanks to @eLearnSecurity for the great course and content Thank you @Resecurity for your support
Tweet media one
2
0
12
@NoRed0x
Karim Habeeb
2 years
In this article, I wrote about Windows Credentials SAM Database part-1 I used tools samdump2,pwdump7, InvokePowerDump.ps1,creddump7,impacket, Mimikatz, Metasploit Framework: HashDump, load kiwi, credential_collector, John The Ripper
0
3
11
@NoRed0x
Karim Habeeb
2 years
if you are interested in network penetration testing or red teaming, I explained the attack using a scf file to gather hashes and if you want to try this attack, htb machine (Driver) #redteam #penetrationtestin
0
2
10
@NoRed0x
Karim Habeeb
3 years
if you are interested in network penetration tester or red teaming I collected most of the commands used in windows enumeration, enjoy
0
2
9
@NoRed0x
Karim Habeeb
2 years
I have explained How to Dump Login Passwords From Current Linux Users and dump credentials from memory, enjoy
0
3
7
@NoRed0x
Karim Habeeb
3 years
if you are interested in network penetration testing or red teaming, I explained office persistence with cobalt strike, enjoy #redteam
0
2
5
@NoRed0x
Karim Habeeb
1 year
@mamunwhh Active url
0
0
5
@NoRed0x
Karim Habeeb
3 years
if you are interested in network penetration testing or red teaming, I explained most Kerberos attacks , enjoy part 1 ===>Kerbroasting part 2 ===>AS-REP Roasting part 3 ===>Silver Ticket
2
0
4
@NoRed0x
Karim Habeeb
3 years
if you are interested in network penetration testing or red teaming I collected most of the commands used AD domain enumeration in three parts, enjoy part 1 ==> part 2 ==> part 3 ==>
0
1
3
@NoRed0x
Karim Habeeb
3 years
the second part of Kerberos attacks (AS-REP Roasting)
0
0
2
@NoRed0x
Karim Habeeb
7 months
@rmxyacine @0xSabir I already edit it on GitHub
0
0
2
@NoRed0x
Karim Habeeb
3 years
I collected most writeups for web vulnerability in this list  #bugbounty #webapplicationsecurity
0
1
2
@NoRed0x
Karim Habeeb
2 years
0
0
2
@NoRed0x
Karim Habeeb
7 months
@0xSabir Thanks can you share valid template
1
0
2
@NoRed0x
Karim Habeeb
2 years
@7h3h4ckv157 Thanks for sharing ❤️
0
0
2
@NoRed0x
Karim Habeeb
23 days
@Proxy936623 The file path /_vti_pvt/service.pwd is not native to any current web framework but is specifically associated with Microsoft FrontPage
0
1
2
@NoRed0x
Karim Habeeb
1 year
@HeisenbugHQ Just exposed
0
0
2
@NoRed0x
Karim Habeeb
2 years
1
0
1
@NoRed0x
Karim Habeeb
9 months
@roohaa_n @ReconOne_bk I found phpMyAdmin, logged in with the provided credentials and successfully accessed the database
0
0
1
@NoRed0x
Karim Habeeb
3 years
In the first part of Kerberos attacks (Kerbroasting) I wrote about spn and use PowerShell scripts such as FindPotentiallyCrackableAccounts.ps1, GetUserSPNs.ps1, TGSCipher.ps1, and Mimikatz waiting for your feedback
0
1
1
@NoRed0x
Karim Habeeb
3 years
if you are interesting in penetration tester and red-teaming, I install SQL server in windows server and connect from windows 10 by HeidiSQL #redteam #penetrationtesting
0
1
1
@NoRed0x
Karim Habeeb
3 years
the command for cobalt strike:execute-assembly opt/seatbelt/SeatbeltNet3.5AnyCPU.exe all
0
0
1
@NoRed0x
Karim Habeeb
3 years
Seatbelt: This tool is more gathering-info oriented than privesc, but it has some pretty nice checks and looks for some passwords. You need to compile it: use precompiled binaries:
1
0
1
@NoRed0x
Karim Habeeb
3 years
0
0
0
@NoRed0x
Karim Habeeb
3 years
if you are interested in network penetration testing or red teaming, I explained the attack using a scf file to gather hashes and if you want to try this attack,htb machine (Driver)
0
0
1
@NoRed0x
Karim Habeeb
3 years
part 4 ===>golden Ticket
0
0
1
@NoRed0x
Karim Habeeb
6 months
@0xGAD @ine Congratulations 👏👏
1
0
1
@NoRed0x
Karim Habeeb
23 days
@nav1n0x From the late 1990s to the early 2000s, the file path /vti_pvt/service. pwd stored configuration files, including sensitive data, related to FrontPage Server Extensions
0
0
1