d3fp4r4m Profile Banner
d3fp4r4m Profile
d3fp4r4m

@defparam

7,186
Followers
546
Following
257
Media
3,483
Statuses

Opinions are my own

Don't wanna be here? Send us removal request.
@defparam
d3fp4r4m
2 months
Tweet media one
9
139
2K
@defparam
d3fp4r4m
4 years
Thanks to everyone for watching my talk! Here are the slides used: (video re-post will be handled by @nahamsec ) pdf: pptx: (has the animations)
7
238
610
@defparam
d3fp4r4m
4 years
My talk is up next on #NAHAMCON2020 stream. As an extra treat I've made public my tooling called Smuggler used to find HTTP De-synchronization. Enjoy!
6
135
356
@defparam
d3fp4r4m
2 months
Tweet media one
8
29
282
@defparam
d3fp4r4m
4 years
So naturally the first thing I want to try is MiniPC M.2 M-key -> M.2 M-key to PCIe x16 adapter -> PCIe to PCI adapter -> PCI to PCIe adapter -> a TPLink PCIe Gigabit Ethernet controller. Any takers on if this monstrosity of a PCI hierarchy will link up and enumerate?
Tweet media one
11
63
244
@defparam
d3fp4r4m
4 years
I developed a 1-python file snapshot-based fuzzer example to show the power of snapshot fuzzing even if your fuzzer loop is in pure python. This is just an educational toy fuzzer. Inspired by @gamozolabs , based on @h0mbre_ 's blog
6
42
236
@defparam
d3fp4r4m
4 years
Hey all! first blog post. Are the popular fuzzers just for binary exploitation? In this blog post I outline how you can find logic issues in web-related regular expressions using differential fuzzing. (spoiler: 29 lines of python using Google Atheris)
1
86
208
@defparam
d3fp4r4m
5 years
So I did promise blog posts on RS CLTE-style attacks, I guess this will have to do for now. Often times with RS hijacking you can throw a victim into an open redirect to steal their tokens/cookies. Many thanks to @SlackHQ for fixing this within 24-hours of discovery #bugbounty
@disclosedh1
publiclyDisclosed
5 years
Slack disclosed a bug submitted by defparam: - Bounty: $6,500 #hackerone #bugbounty
Tweet media one
1
84
224
22
54
204
@defparam
d3fp4r4m
2 years
Example of using Turbo Intruder in a "listen and attack" mode. A hidden secret: you can have turbo intruder scripts use the burp plugin API. Here we use burp.IProxyListener to intercept requests and reissue them inside turbo intruder mutating the method.
6
44
190
@defparam
d3fp4r4m
3 years
Be careful running turbo intruder on an endpoint that triggers snail mail. Luckily it was only 40 requests📨♻️
Tweet media one
4
9
177
@defparam
d3fp4r4m
3 years
New blog post for pentesters and bug bounty hunters: A walk though on how to set up Burp Suite for iOS App testing on both a physical jailbroken iOS device and also an emulated jailbroken iOS device on @CorelliumHQ #bugbounty
4
63
152
@defparam
d3fp4r4m
4 years
Can anyone take a guess what my talk will be on? Practical HTTP Request Smuggling Attacks :)
@NahamSec
Ben Sadeghipour
4 years
Excited to announce #NahamCon with @stokfredrik , @_johnhammond and @thecybermentor on Junst 13, 2020 with talks from @samwcyo , @TomNomNom , @snyff , @Jhaddix , @intigriti , @Jhaddix , @zseano , @defparam , @ChloeMessdaghi , @jcran , and more! Website will be live later :)
Tweet media one
16
148
706
6
20
142
@defparam
d3fp4r4m
4 years
What is HTTP Response Queue Poisoning? Check out my talk "Practical Attacks using HTTP Request Smuggling" this Saturday There I will share 3 common techniques I used in past RS reports and 2 PoCs demonstrations of session stealing :) Bonus: I may be releasing some tools ;)
@NahamSec
Ben Sadeghipour
4 years
Everything you need to know about #NahamCon : Schedule: Discord: CTF: Donate: Thank you @TheParanoids , @eLearnSecurity , @intigriti , @yeswehack , @Bugcrowd , @SynackRedTeam & @Hacker0x01 !
Tweet media one
14
111
355
9
27
146
@defparam
d3fp4r4m
5 years
0
37
119
@defparam
d3fp4r4m
3 years
Never thought smuggler would reach ~1k stars on github with ~200 forks. Thanks y'all for the support! I'm hopeful we did our part crushing this severe bug class.
3
21
108
@defparam
d3fp4r4m
5 years
Here are a couple of things some HTTP reverse proxies normalize which requires careful parsing #bugbountytip Absolute Endpoint Normalization: Frontend: GET https://<host>:<port>/ep HTTP/1.1 ... Backend: GET /ep HTTP/1.1 Host: <host>:<port> ...
6
26
110
@defparam
d3fp4r4m
4 years
Gist of the Day - Turbo Intruder Cluster Bomb with Smart Filtering. 100 line script to dirsearch a host using different HTTP methods with Smart Filtering of responses with common status+length
5
41
108
@defparam
d3fp4r4m
4 years
Fuzzing community: any write ups on clever tips/tricks/methods around developing harnesses? I would love to read more about practical harness development when hard to reach surfaces aren’t given to you in a nice clean API. i.e: enjoyed reading this one:
3
27
103
@defparam
d3fp4r4m
5 years
Why go for impact? Write descriptive reports? Give PoC + Video? because your duplicate may turn into a paid out Crit if the program prefers your report over the first finder. Shout outs to this h1 priv program, thats how you run a bounty program. #togetherwehitharder #bugbounty
Tweet media one
5
6
96
@defparam
d3fp4r4m
3 years
When choosing a good bounty program on h1 you really need to look at all the program data altogether. Unfortunately the h1 directory doesn't list all data and all programs in a single view. I wrote a tool called h1stats to scrape data into 1 CSV
5
23
98
@defparam
d3fp4r4m
8 months
@hakluke I don’t understand how anyone could say that with such confidence. I’d be reluctant to say that with my simple home network. I guess blind confidence gets you that top job
0
1
94
@defparam
d3fp4r4m
5 years
I'm glad a lot of people are resonating with the way I explained this RS CL.TE attack in the report. I'm a visual learner so I always go to diagrams to understand or convey technical concepts. Here are the diagrams from the report
Tweet media one
Tweet media two
6
23
94
@defparam
d3fp4r4m
4 years
Today is the day, come join #NAHAMCON2020 and watch the talks. Come see my talk (roughly 1:30PM PDT), I'll have a couple new git repos going live 😎
Tweet media one
@NahamSec
Ben Sadeghipour
4 years
We are live!
Tweet media one
4
32
134
1
11
91
@defparam
d3fp4r4m
6 years
Page Walking Cheat Sheet: Architecting a page walker on FPGA. Tired off looking up this info over and over. Placing it here hoping that it helps others and "future me" #wininternals #fpga
Tweet media one
5
23
89
@defparam
d3fp4r4m
5 years
Finally made it to the 4-digit club. You guys are tough to keep up with. #togetherwehitharder
Tweet media one
9
1
88
@defparam
d3fp4r4m
1 year
Tweet media one
@infosec_au
shubs
1 year
For a few months, @samwcyo , @bbuerhaus , @rhyselsmore and I focused on hacking EPP servers / ccTLD zones. We're disclosing our work today on the hackcompute blog: Our efforts in this space led to the ability to control the DNS zones of the following
16
249
685
1
7
85
@defparam
d3fp4r4m
4 years
Sigh... people keep getting startled by double HTTP responses in burp thinking that it is HTTP Request Smuggling when it's actually HTTP Request Pipelining
4
23
79
@defparam
d3fp4r4m
5 years
To continue research into how broken HTTP/1.1 reverse proxies are I wrote a fuzzing framework to throw mutations at reverse proxies (with backend observation). I've only gone couple hours into testing before I found some serious issues. Time to report!
4
9
74
@defparam
d3fp4r4m
3 years
Haptyc - A Test Generation Framework for Turbo Intruder. This library adds payload position support and Sniper/Clusterbomb/Batteringram/Pitchfork attack types into Turbo Intruder. Enjoy!
0
32
74
@defparam
d3fp4r4m
2 years
The commit has a very detailed write-up on this bug for those who enjoy HTTP header exploits
@albinowax
James Kettle
2 years
HAProxy CVE-2023-25725 sounds like it might be a Connection header exploit... just like #7 from the top 10 hacking techniques of 2022:
5
51
185
4
20
74
@defparam
d3fp4r4m
4 years
Welcome all new followers, I didn’t expect my work to attract so many, thanks a ton for your interest in niche bugs! I’m not necessarily a content creator but I do love to share my findings/work/research with the community when possible. Pax et Amor ☮️❤️
5
1
72
@defparam
d3fp4r4m
1 year
I don't know about y'all but over the weekend I played around with single-packet attacks on stateful endpoints. There's a lot of weirdness out there... It's super easy to issue them in the repeater too. I have a hunch that this is going to create a lot of "fun" problems
Tweet media one
@albinowax
James Kettle
1 year
Thanks to everyone who came to the #DEFCON31 edition of Smashing the State Machine! I'll be hanging around chilling for the next couple of days; feel free to say hi. Hope the techniques yield many crazy bugs for you in future :)
4
47
225
2
6
70
@defparam
d3fp4r4m
4 years
Any interest on a starting a discord server primarily focused on Web Security Research and Tooling? No discussion of bug bounty, bug bounty support. Sort of keeping it research based/academic for researchers + tool devs? Does this exist already? @garethheyes @albinowax @Agarri_FR
15
4
71
@defparam
d3fp4r4m
5 years
10 Triaged Crit/P1, 1 Triaged High, 2 Triaged Medium. All of them HTTP Desync bugs in the span of 2 months (The crits being session cookie/token stealing). This bug class is real and needs more attention...
6
5
71
@defparam
d3fp4r4m
4 years
In a recent @Hacker0x01 collaboration with none other than Mr. @NahamSec , We got a HIGH on one HTTP Request Smuggling report that turned into an MS IIS Advisory. If you run IIS take a look
@NahamSec
Ben Sadeghipour
4 years
Did some hacking with @defparam a while ago and didn't expect this to come out of it: ADV200008 | Microsoft Guidance for Enabling Request Smuggling Filter on IIS Servers 😂
1
9
111
2
3
69
@defparam
d3fp4r4m
4 years
I’m super happy people are finding weird issues and responses with . Sadly I can’t help everyone escalate from there. Every infrastructure is different. Similar to finding signs of SQLi or Java Deserialization, Desync attacks may need very specific payloads
3
4
65
@defparam
d3fp4r4m
4 years
Random tip: If you watched a technical con talk several months ago on a topic you've been researching/testing since then, go back and re-watch the old talks. It's amazing how many subtle details start to "click in" and make sense the second/third/fourth time around. #bugbountytip
2
12
64
@defparam
d3fp4r4m
4 years
Youtube links aren’t up yet but If you want to check out the video to my talk “Practical Attacks using HTTP Request Smuggling” you can hit up the Nahamcon2020 twitch archive link here: (at 4:28:00) Response Queue Poisoning explained at the end of the talk
1
9
62
@defparam
d3fp4r4m
5 years
With "Cached and Confused: Web Cache Deception in the Wild" taking the #1 spot, and @albinowax 's HTTP Desync Attacks being the community favorite can we all admit now that proxying HTTP traffic through these "transparent proxies" fundamentally breaks HTTP?
@PortSwiggerRes
PortSwigger Research
5 years
Top 10 new web hacking techniques of 2019
7
760
1K
2
15
58
@defparam
d3fp4r4m
4 years
@s0md3v Here in an example of a JSON/Structure aware fuzzer I wrote for turbo intruder. On queueRequests I create a nice abstraction to parse, iterate, modify every value in a JSON body and issue out a test for each mutation/value.
1
18
58
@defparam
d3fp4r4m
1 year
It would have never crossed my mind to realize that as hobbyists we have the PCB manufacturing capabilities today to completely interpose a 150 pin CPU from the 2000s...
3
9
55
@defparam
d3fp4r4m
4 years
An older write-up but a good story of using structure aware fuzzing to find bugs in PHP unserialize. Specialized fuzzers like this can be very powerful.
0
15
56
@defparam
d3fp4r4m
5 years
Looking to give back to the community, I studied . @albinowax 's HTTP Request Smuggling research, took his payloads from his BURP plugin code and create a testing tool in python called Smuggler. !!TIMEOUT!! == potential issue. Hoping to release by next week. #togetherwehitharder
Tweet media one
10
10
54
@defparam
d3fp4r4m
3 years
h2echo - an extremely permissive h2 webserver for the purpose of visualizing malformed h2 requests. finishing up this and h2smuggler in order to provide commandline alternatives to burp's h2 testing tools and to make it easier for others to research in this area (more to come)
Tweet media one
3
3
54
@defparam
d3fp4r4m
4 years
If you enjoy FPGAs and hacking PCI, here is a reference platform for all that I've used to build PCI devices on the DE0-Nano FPGA board and test on x86 SBCs. I can confirm it working enumerating my "1337"-Communication Controller. Enjoy!
Tweet media one
2
6
52
@defparam
d3fp4r4m
4 years
It certainly does! PCI/PCIe is a fairly well written spec with special care to backwards compatibility. Those pericom chips on the Startech adapter boards are pretty nifty too.
Tweet media one
2
1
52
@defparam
d3fp4r4m
1 year
Everyone purchase your ferraris, I found naffy's secret hes been trying to hide from us
Tweet media one
@nnwakelam
Nathaniel
1 year
like $120k USD in the past couple weeks we out here
6
0
69
4
7
47
@defparam
d3fp4r4m
5 years
h1passets - I created a tool that will print all your HackerOne private program URLs that are in-scope and eligible for bounty to stdout #BugBounty
1
14
45
@defparam
d3fp4r4m
5 years
This is actually my first bounty ever awarded to me. Thanks @NahamSec for your @Twitch streams which got me started on this journey. I'm glad to hear that you are back! #TogetherWeHitHarder
7
2
49
@defparam
d3fp4r4m
4 years
New server day🎉 Supermicro 92 cores - Quad Xeon - 768GB ECC DDR4. Just in time for several fuzzing harnesses I whipped up, also I get to warm my cold basement a little, Win/Win.
Tweet media one
5
2
49
@defparam
d3fp4r4m
1 year
This LK-99 stuff feels like a insane CVE with everyone patch-diffing for a PoC
1
5
43
@defparam
d3fp4r4m
4 years
Smuggler is used for non-destructive recon, for issuing actual desync attacks take a look at my turbo intruder scripts here:
2
11
44
@defparam
d3fp4r4m
6 years
- I finally released BAR-Tender v0.1 - A UMDF2 driver/app framework to provide easy local physical memory access through the PicoEVB FPGA mapped I/O device. Use this as a foundation for your DKOM/Kernel hacking and Win64 FPGA acceleration needs 😈
Tweet media one
2
17
43
@defparam
d3fp4r4m
2 months
Random Gist: cidr scrapper
Tweet media one
0
2
41
@defparam
d3fp4r4m
4 years
Learn how to reverse engineer Android application APIs
1
16
38
@defparam
d3fp4r4m
4 years
PCIe is a little too modern for me. So I decided to create a PCI adapter board for my DE0-Nano and hook it up to the Startech PEX1PCI1 . I have no functions to show yet but I am writing my config space driver in verilog and able to see the queries in signaltap. That is all!
Tweet media one
Tweet media two
4
3
37
@defparam
d3fp4r4m
3 years
People upset about bug dupe rules on Pwn2Own/ZDI. Hackers on @Hacker0x01 @Bugcrowd with hundreds of non-paid dupes over the years:
Tweet media one
@dragosr
dragosr
3 years
@ryanaraine Sincerely I don’t get it. So many folks have been burned by that, changing that rule at this time would be exactly the wrong message to send. And frankly I don’t think it’s changeable. Vendors are always restrictive with bounties, first one in gets the prize, literally.
1
2
18
0
2
38
@defparam
d3fp4r4m
3 years
Thinking about updating smuggler to support more test variations and the latest HTTP/2 research. 🤔 I did some work tonight on HTTP/2 and it looks feasible
2
3
36
@defparam
d3fp4r4m
4 years
#BasementLab , when you need to go deep on a target 😈. prepping the lab for some HW/IoT testing this week
Tweet media one
1
0
37
@defparam
d3fp4r4m
3 years
My talk on Haptyc is up soon at Being able to specify positional tags on your Turbo Intruder requests gives testers a ton more power to test random mutations in an easily expressible and constrained way. Github link coming up soon. #hacktivitycon2021
Tweet media one
1
8
36
@defparam
d3fp4r4m
4 years
Honestly I find this to be the fastest way to set or switch server / protocol configurations in Burp Repeater
@_sawzeeyy
👣
4 years
Never knew one could "Paste URL as request" in Burp until I watched @defparam 's talk at #nahamcon yesterday 🧐
Tweet media one
6
22
147
1
6
34
@defparam
d3fp4r4m
7 years
I'm thinking about starting a twitch stream on low-end FPGA development and my retro projects. There are lots of trick in FPGA dev that I think would be fun and useful to publish...
1
3
36
@defparam
d3fp4r4m
4 years
hehe, good job varnish
Tweet media one
2
1
34
@defparam
d3fp4r4m
4 years
After 8 years working on hardware architecture and FPGAs for @AlteraCorp / @IntelFPGA , yesterday was my last day. I will miss my co-workers. Going forward I’m excited to be shifting my career focus to infosec and web security. More details to come 🙂
4
0
35
@defparam
d3fp4r4m
1 year
Thank god they were able to implement native support of Ads and telemetry before these useless features
@BleepinComputer
BleepingComputer
1 year
Windows 11 is getting native support for 7-Zip, RAR, and GZ archives formats in an update coming this week.
64
182
1K
2
6
35
@defparam
d3fp4r4m
3 years
Btw, if you hadn’t figured it out yet Jonathan Scott is just some campaign exploiting Cunningham’s law to DoS infosec researchers into wasting time on Twitter rebutting baseless claims. And it’s working pretty damn well
1
1
35
@defparam
d3fp4r4m
4 years
Just a kind PSA to users of : Please don't report the results of a scan directly to BB programs as a bug without manual confirmation. errors are not direct evidence of a vulnerability. Show impact, not logs
5
5
35
@defparam
d3fp4r4m
1 year
@ajxchapman @Michael1026H1 @_StaticFlow_ Oh btw, I have to bring this up because I just watched @G0LDEN_infosec ’s amazing defcon talk. If you are thinking about dipping your feet into designing serverless workloads for your automation/semi-automation check out his talk:
3
2
35
@defparam
d3fp4r4m
4 years
Decided to look up the history/format of the "User-Agent" string. It's cursed🤦‍♂️
Tweet media one
0
6
34
@defparam
d3fp4r4m
5 years
@TomNomNom - Scheduling meetings at comfortable times (if timezone is an issue) - If the co-located team goes out for company sponsored lunch I've been given budget to take my fiancee out to dinner
1
0
34
@defparam
d3fp4r4m
1 year
Want the easiest start in full automation? Literally create a single python script that does 1 security check and has a slack webhook that fires if the check hits. Throw that script on AWS Lambda or Digitalocean Functions with a daily execution schedule and forget about it.
5
3
33
@defparam
d3fp4r4m
5 months
@ErrataRob Reminds me of the hell one person (a security researcher no less) willingly went through when they decided to purchase the California vanity license plate 'NULL'
1
4
32
@defparam
d3fp4r4m
4 years
OK a couple interesting things about this request smuggling bug: 1) My picked up on it for only the DELETE verb (I hadn’t seen that before) 2) The issue manifested somewhere in Akamai
2
6
31
@defparam
d3fp4r4m
3 years
Welp, just when I thought I walked away from Request Smuggling @albinowax pulls me back in…
@PortSwiggerRes
PortSwigger Research
3 years
HTTP/2: The Sequel is Always Worse by @albinowax
14
497
1K
0
1
33
@defparam
d3fp4r4m
4 years
Tweet media one
3
6
33
@defparam
d3fp4r4m
6 years
With a lot of cool FPGA-based projects being written in Migen these days I decided to jump head first into it tonight. Here is a write up of my LED driver written in Migen. My early impressions are that I really enjoy it, but need way more practice.
4
6
32
@defparam
d3fp4r4m
3 years
hello world
Tweet media one
1
2
31
@defparam
d3fp4r4m
5 years
While retro enthusiasts argue over FPGA vs. Emulator I went the "Why not both?" path and integrated an FPGA RTL simulation model into Higan (cc @byuu_san ). Instead of fighting, both groups can actually help each other move forward to the same goal :)
3
6
32
@defparam
d3fp4r4m
4 years
Next research path will be into binary fuzzing, Looking to buy a decent fuzzing rig to start out, i’m thinking dual-socket Gold Xeons around 32 cores with around 256GB ram. Input welcomed, not cost constrained at the moment but starting small
9
1
31
@defparam
d3fp4r4m
3 years
For those who use Turbo Intruder day-to-day, check out response decorators for response matching/filtering. I created these decorators for everyone to use who wants fuff-like matches/filters applied in turbo intruder as 1 line function decorations. Enjoy!
@albinowax
James Kettle
3 years
Turbo Intruder 1.21 was just released, with a shiny new way of filtering responses by @defparam . Check out the docs:
Tweet media one
1
30
134
5
1
30
@defparam
d3fp4r4m
4 years
Taking a little break from websec to do a little hardware hacking tonight (FPGAs/PCIe/PCI specifically). I received my Seeed Odyssey board, these Celeron J4105-based MiniPCs are pretty nifty. I also have some M.2 adapter boards, PCIe-2-PCI bridge and PCI-2-PCIe bridge
Tweet media one
2
3
31
@defparam
d3fp4r4m
10 months
We don’t know everyone’s story to pirate, I’ve definitely dabbled in keygens when I was a teen and had no other money. One pro move would be for bounty programs to gift a pro license if they see evidence of cracked software in a valid report. Everyone wins
@ant0inet
Baklava Monster
10 months
"ethical" hackers using cracked @Burp_Suite in #bugbounty submissions 🤷‍♀️
Tweet media one
29
25
270
2
1
30
@defparam
d3fp4r4m
3 years
Tweet media one
0
1
29
@defparam
d3fp4r4m
4 years
This. This is why at times I enjoy building my own tools even tho there already exists known popular ones in the community. The abstraction some tools create: 1) dulls your knowledge on what is going on at a low level and 2) forces you to follow a specific author's abstraction
@SwiftOnSecurity
SwiftOnSecurity
4 years
Tools can also dull your skills. When everything you experience about a system is filtered through a disparate set of other people’s interpretations, you cannot connect underlying dots and behaviors you would readily observe if forced to do so directly using the native toolset.
3
15
117
3
5
28
@defparam
d3fp4r4m
5 years
An HTTP Request Smuggling CL.TE bug lets you redirect a victim connection to a forged endpoint with GET parameters. FYI you can execute a forged graphql query this way on the victim by using: GET /graphql?query=<query> #bugbountytip
0
8
28
@defparam
d3fp4r4m
3 years
honeymoon #maui
Tweet media one
2
0
28
@defparam
d3fp4r4m
4 years
Hey all, I open sourced an RTL implementation of a PCI core and an 8250-compat PCI UART function. In the demo I create a serial port function to interface with an on-board nios2 processor. With this design, low-end FPGA devs can start tinkering with PCI !
1
6
28
@defparam
d3fp4r4m
3 years
Orange Tsai is a vuln finding robot 🤖
@orange_8361
Orange Tsai 🍊
3 years
Originally, I was very depressed about the bug collision(the SSRF part in #ProxyLogon exploit) with bad APT groups☹️ So I decided to sit down and dig for a new one... Here it is!
17
116
451
1
2
28
@defparam
d3fp4r4m
2 years
I hate you with the fiery passion of a thousand burning suns, scorching every fiber of my being and leaving nothing but smoldering ashes in its wake
Tweet media one
3
2
27
@defparam
d3fp4r4m
4 years
Give this man a 128-pack of redbull
@galnagli
Nagli
4 years
Extracting sessionID from RXSS on redbull domain #BugBounty
Tweet media one
6
4
80
2
0
26
@defparam
d3fp4r4m
5 years
My alter ego from Security is #FPGA Architecture. My first patent as . @IntelFPGA was approved! This an architecture that allows for OpenCL kernels on one FPGA to communicate to OpenCL kernels on other FPGAs directly over network to scale on a common workload. #iamintel
Tweet media one
1
1
27
@defparam
d3fp4r4m
5 years
Also shout outs to @paypal security, @Grabsg security and @Zomato security who have in the past provided bonuses for descriptive write-ups, fast communication and availability for re-test
2
2
27
@defparam
d3fp4r4m
3 years
What do you get when you combine Turbo Intruder and Burp Collaborator? Turbo Collaborator! Look mom, it auto-binds ping backs to the requests that cause them. Inject those collab urls everywhere Worked on some weird TI scripts last night..
Tweet media one
2
3
27
@defparam
d3fp4r4m
5 years
It's a pleasure working with the @Zomato security team. @prateek_0490 and his team rocks. #togetherwehitharder
2
3
27
@defparam
d3fp4r4m
4 years
Whispers v0.1 - A conceptual websec tool PoC - About ~450 lines of python + IMGUI bindings I wrote over the weekend. Works on Linux/Win. Perhaps the beginnings of a nice visual open source websec tool. I'm thinking of leveraging MITMProxy for web analysis #bugbounty
0
5
25
@defparam
d3fp4r4m
6 years
Sorry to spoil the surprise but I couldn't help but notice that RHSResearchLLC which made the PicoEVB and NanoEVB is making a MicroEVB () 😀 - Xilinx Artix-7 200T part - PCIe Gen2x4 (20 Gb/sec) - 512Mb DDR3 - M.2 key M 2280
Tweet media one
Tweet media two
0
5
26
@defparam
d3fp4r4m
11 months
Having the capability of asking "dumb questions" in a vast dataset of a burp project is basically the start of any interesting research. I can see why this is a powerful tool
@PortSwiggerRes
PortSwigger Research
11 months
Wrote a bamda to detect HTTP responses containing a space in the header name... not sure what we were expecting to find but it definitely worked return requestResponse.response().headers().stream().anyMatch(e -> ().contains(" "));
Tweet media one
2
12
129
1
3
26
@defparam
d3fp4r4m
2 years
Tweet media one
2
1
26