#Kaeferjaeger + H1 Ambassador
🏠 https://security.lauritz-holtmann.de
Check out the blog post in case you missed it: security.lauritz-holtmann.de/advisories/f...
H1 disclosure: hackerone.com/reports/1342...
Leaderboard (still in progress): leaderboards.hackerone.live/germany-meet...
👉 h1.community/e/mbkdm3/
#BugBounty #Meetup #HackerOne
Leaderboard (still in progress): leaderboards.hackerone.live/germany-meet...
👉 h1.community/e/mbkdm3/
#BugBounty #Meetup #HackerOne
Big thanks to @exness6.bsky.social for putting together such a great virtual meetup, and a special shoutout to @lauritz-holtmann.de!
Everything was incredibly well organized! 🙌
We x6 the overall bounties of our previous meetup and scored over 94,000$ overall bounties. 🤯
Additionally, H1 swag is on the way to all attendees and will arrive soon. 🤞
Big thanks to @exness6.bsky.social for putting together such a great virtual meetup, and a special shoutout to @lauritz-holtmann.de!
Everything was incredibly well organized! 🙌
We x6 the overall bounties of our previous meetup and scored over 94,000$ overall bounties. 🤯
Additionally, H1 swag is on the way to all attendees and will arrive soon. 🤞
We x6 the overall bounties of our previous meetup and scored over 94,000$ overall bounties. 🤯
Additionally, H1 swag is on the way to all attendees and will arrive soon. 🤞
Almost 40 signups, ~25 active remote attendees and 12 attendees from all over Germany who travelled to #Bochum and hacked together in person on Grab's assets. 🤯
#BugBounty #Meetup
Almost 40 signups, ~25 active remote attendees and 12 attendees from all over Germany who travelled to #Bochum and hacked together in person on Grab's assets. 🤯
#BugBounty #Meetup
@hacker0x01.bsky.social Club x Grab
The event is organised like a Mini-LHE:
📅 15.02. - 21.02.25 Remote Hacking
📅 22.02.25 In-Person Day
📍#Bochum (Work Inn Bochum-FiftyOne)
‼️ Signup Deadline: Wednesday, Feb 12th.
👉 h1.community/e/mgswsg/
@hacker0x01.bsky.social Club x Grab
The event is organised like a Mini-LHE:
📅 15.02. - 21.02.25 Remote Hacking
📅 22.02.25 In-Person Day
📍#Bochum (Work Inn Bochum-FiftyOne)
‼️ Signup Deadline: Wednesday, Feb 12th.
👉 h1.community/e/mgswsg/
We will organize the event like a Mini-LHE: Like last year, there will be again a collaborating H1 program and a leaderboard.
(1/3)
We will organize the event like a Mini-LHE: Like last year, there will be again a collaborating H1 program and a leaderboard.
(1/3)
Ping me here or via ☎️5876 if you want have a chat, talk about things like #BugBounty or just want to have a Tschunk together. :)
I also have a handful of #H1 stickers with me to spread. 😏
Ping me here or via ☎️5876 if you want have a chat, talk about things like #BugBounty or just want to have a Tschunk together. :)
I also have a handful of #H1 stickers with me to spread. 😏
👉 security.lauritz-holtmann.de/post/sso-and...
Discover how twitter.com/_kun_19 and I uncovered a severe issue allowing hijack of SSO flows on Android… only to find we were years late to the party.
#BugBounty #Security #FuckUp
👉 security.lauritz-holtmann.de/post/sso-and...
Discover how twitter.com/_kun_19 and I uncovered a severe issue allowing hijack of SSO flows on Android… only to find we were years late to the party.
#BugBounty #Security #FuckUp
👉 chromewebstore.google.com/detail/opfeo...
Keep in mind that the extension needs broad permissions to work. I'd recommend to only install it to your "research browser".
Github: github.com/lauritzh/dea...
👉 chromewebstore.google.com/detail/opfeo...
Keep in mind that the extension needs broad permissions to work. I'd recommend to only install it to your "research browser".
Github: github.com/lauritzh/dea...
Check out the blog post in case you missed it: security.lauritz-holtmann.de/advisories/f...
H1 disclosure: hackerone.com/reports/1342...
Check out the blog post in case you missed it: security.lauritz-holtmann.de/advisories/f...
H1 disclosure: hackerone.com/reports/1342...
The vulnerable URL is b64-encoded and included within the canary URL.
👉 gist.github.com/lauritzh/7b3...
📚 security.lauritz-holtmann.de/post/sso-sec...
The vulnerable URL is b64-encoded and included within the canary URL.
👉 gist.github.com/lauritzh/7b3...
📚 security.lauritz-holtmann.de/post/sso-sec...