the site has come back up, and vulnerabilities that used to be fixed are now no longer fixed for some reason so there's even more ways to steal twexit accs now compared to when he shut the site down
12.08.2024 20:17 โ ๐ 6 ๐ 0 ๐ฌ 1 ๐ 0@richardwrites672.bsky.social
adrianus websites try not to have every vulnerability type challenge adrianus count: 4 xss (technically 5 if you count the firstpost xss), 10 sqli non-adrianus count: 15 xss, 6 sqli, 1 hamburger, 5 auth bypass, 10+ "chatDisabled":true https://6v.pages.dev
the site has come back up, and vulnerabilities that used to be fixed are now no longer fixed for some reason so there's even more ways to steal twexit accs now compared to when he shut the site down
12.08.2024 20:17 โ ๐ 6 ๐ 0 ๐ฌ 1 ๐ 0i found multiple xss bugs just about daily (so i could steal the twexit cookies of anyone who clicked on the twexit link i had a spambot post), and then retr0id (and later me) found some sql injection bugs and adrianus shut the site down
12.08.2024 20:15 โ ๐ 5 ๐ 0 ๐ฌ 2 ๐ 0oh wow, twexit's back, i sure hope adrianus has done literally anything to improve his website's security
12.08.2024 19:36 โ ๐ 6 ๐ 0 ๐ฌ 1 ๐ 1This virtual session is intended for McDonald's Employees, Market Staff and Suppliers. If you were not invited, please disconnect now.
08.06.2024 21:25 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0Pro tip: you can send messages from banned accounts, and people will still receive it (although the message is only visible in the preview)
26.05.2024 09:29 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0SkyBucksใจใใในใใ DMใไธ้จใงๆจช่กใใฆใใใใใงใใใณใผใใฎใณใกใณใใ่ฆใ้ใใคใฟใบใฉใฃใฝใใใงใใใใชใณใฏๅ ใซใฏ้ฃใฐใชใใใใซใใพใใใ๏ผใญใผในใใญใผใฏใชใฉใใใฉใใญใณใฐใใใฆใใใใใชใฎใงใขใซใในใจใๅ ฅๅใใกใใใก๏ผใใกใชใฟใซClaim GiftใใใจใBlueskyใซๅบๅใๅบ็จฟใใใใในใใซ่ฒใไปใใใใใใใใใงใใใใใใญ
26.05.2024 01:24 โ ๐ 146 ๐ 231 ๐ฌ 0 ๐ 5Here's a screenshot of BitView's admin panel.
09.03.2024 21:05 โ ๐ 3 ๐ 0 ๐ฌ 3 ๐ 0Skyname is back online.
Please read below for a detailed postmortem of the incident:
darn.blog/2024-01-14-s...
Skyname experienced a brief incident today where a malicious third party was able to overwrite DNS records pointing to registered usernames.
All usernames have been successfully restored, and you should expect to see yours update in 24-48 hours if you're still seeing Invalid Handle.
A log output showing various usernames on skyna.me being redirected to richardwrites672.bsky.social.
The skyname web portal, showing richardwrites672.bsky.social having 846 usernames linked to the account.
I now control every skyname handle :)
(Well, every skyname handle that has appeared in plc.directory/export )
mayhaps
14.01.2024 20:04 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0@twexit.nl @adrianus.twexit.nl Check your twitter DMs
28.12.2023 06:04 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0The database for the Adrianus site RealTopTweeps.com (and also twintov.com)
The database for the Adrianus site yalphax.com
The database for the Adrianus site simplegymtracker.com
The database for the Adrianus site twuizzle.com (and also worldtoptweets.com)
By the way, this isn't just twexit and mastochist. Every single website that Adrianus has ever made is vulnerable to SQLi.
26.12.2023 07:25 โ ๐ 49 ๐ 9 ๐ฌ 4 ๐ 5It is an adrianus project, yes. The domains (mastochist.com and mastochist.nl ) don't resolve but you can still access it by setting an /etc/hosts entry with the IP of the twexit server.
26.12.2023 06:02 โ ๐ 15 ๐ 0 ๐ฌ 0 ๐ 0Merry christmas.
mastodon.nl/@adrianus/11...
archive.is/kwqQB
To make my point clearer:
If I had just reported the bugs to you, nothing would have changed. There would be more bugs to take their place, and people who didn't want to make it as public as I did would have taken advantage of them. It's likely some already have.
Instead, your websites are down.
Because given your other posts about how having common bugs in your app "ruined your reputation", I doubt it.
Do you think no one took advantage of the SQL injection vulnerabilities present in your older project Twopcharts? Because I heavily doubt that as well.
I've never tried to frame my actions as being "absolutely fine" and I'm not sure why you're attempting to say that.
I do want to ask you: If I had just privately reported the issues to you, would you have made people aware that their information was at risk from using your service?
Emails and bluesky login tokens were out in the open though, which absolutely is a real concern.
24.12.2023 19:20 โ ๐ 17 ๐ 0 ๐ฌ 2 ๐ 0There it is. Seems like twexit is actually dead now-- no page is working anymore.
twexit.nl
archive.is/LJnFd
(For clarity's sake-- I am not the one that put the image on the website. That seems to have been the action of the actual admin of the site.)
Bingo.
22.12.2023 14:55 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0The main issue with this one is that it's injection into an order by/limit query, and the only exploitation strategy I could find for it was very restrictive and seemingly didn't allow for select statements.
I've found a (potentially) better sqli method that I'm still investigating though.
Finally, here's XSS in twexit post-shutdown
6v.pages.dev/final
:)
Alright, looking into it more it seems the sql injection bug I found isn't actually exploitable in terms of getting database contents, just calling some functions. Could be wrong, though.
If anyone else wants to give it a try:
POST twexit.nl/js_output_te...
w/ data first=0(sql here)
I think your website has some sort of bug in it.
22.12.2023 11:07 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0database() like 'admin_twexit'
(this bug is very annoying to exploit)
not particularly, no :)
22.12.2023 10:59 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0