Louis Nyffenegger's Avatar

Louis Nyffenegger

@snyff.pentesterlab.com

Founder/CEO/Trainer/Researcher/CVE archeologist @PentesterLab. Security engineer. Bugs are my own, not of my employer...

902 Followers  |  40 Following  |  37 Posts  |  Joined: 11.11.2024  |  1.6825

Latest posts by snyff.pentesterlab.com on Bluesky

I’ve spent 2 solid hours doing bug bounty and I still haven’t made $200k.

Can someone tell me what I’m doing wrong?

#bugbountytips

20.04.2025 23:09 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
How AI-Generated Code Is Changing Secure Code Review Learn how AI-generated code impacts secure code review and application security. Discover why AI excels at catching common vulnerabilities but needs human expertise for complex bugs.

AI-generated code is reshaping secure code reviewβ€”fewer trivial bugs, but more hidden threats.

Read more in our new blog post:

pentesterlab.com/blog/secure-...

What do you think?

24.02.2025 22:49 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
I Don’t Want My Devs to Become Hackers! - PentesterLab's Blog Discover why encouraging developers to learn ethical hacking boosts security, reduces bugs, and fosters a proactive security culture in your organization.

Think teaching devs to hack is risky?

In reality, a bit of hacking knowledge helps them spot vulnerabilities early and build stronger apps.

Discover why having devs with a 'hacker mindset' is a win for security:

pentesterlab.com/blog/why-dev...

13.02.2025 18:21 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

From now on, I'll call any snippet of vulnerable code shared on Social Media as

"Security Code Review Porn"

It gives the wrong expectations about what real code review actually involves.

07.02.2025 02:44 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Common OAuth Vulnerabilities Β· Doyensec's Blog Common OAuth Vulnerabilities

Articles worth reading discovered last week:

🀝 blog.doyensec.com/2025/01/30/o...
☠️ www.feistyduck.com/newsletter/i...
πŸ“š pathonproject.com/zb/?871f0933...

And as always, it’s in our blog: pentesterlab.com/blog/researc...

#PentesterLabWeekly

02.02.2025 21:50 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0

If you’re in the area, here’s my schedule:
* OWASP Bay Area (Feb 11)
* CactusCon in Mesa/Phoenix (Feb 14 & 15)
* OWASP Los Angeles (Feb 18)
* OWASP Orange County (Feb 20)

I’d love to connectβ€”if you’re nearby, please stop by and say hello (and maybe grab some swag)!

29.01.2025 23:33 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I’m excited to share that in a few weeks I’ll be heading to the US for a series of talks and workshops focused on security code review and JWTβ€”and I’ll be bringing some
@pentesterlab.com swag along too!

29.01.2025 23:33 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Post image 28.01.2025 03:12 β€” πŸ‘ 9    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
PentesterLab: Learn with our Recon Badge The Recon badge is our set of exercises created to help you learn Reconnaissance. From findings usual files down to DNS and TLS exploration, this badge will help you get better at finding new targets

πŸš€ Level up your #CyberSecurity skills FOR FREE! πŸ›‘οΈ

Earn the Recon Badge with Pentesterlab and master: πŸ” Virtual Hosts 🌐 DNS Recon πŸ”’ TLS Recon ...and so much more!

Start your journey today
πŸ‘‰ pentesterlab.com/badges/recon

25.01.2025 00:09 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

...

22.01.2025 09:35 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Networking but not TCP/IP - PentesterLab's Blog Discover how building real-world connections in the InfoSec community can accelerate your journey into pentesting and cybersecurity. From local meetups and conferences to online communities, this guid...

Networking in InfoSec isn’t just about IP addresses and portsβ€”it’s also about people!

Discover how meetups, conferences, and volunteering can open big career doors in InfoSec.

Read more: pentesterlab.com/blog/infosec...

11.01.2025 23:59 β€” πŸ‘ 11    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
A Signature Verification Bypass in Nuclei (CVE-2024-43405) | Wiz Blog Wiz's engineering team discovered a high-severity signature verification bypass in Nuclei which could potentially lead to arbitrary code execution.

Someone shared this write-up in the @pentesterlab.com 's discord:

www.wiz.io/blog/nuclei-...

I love this article so much! The content and the analysis are A+

I really like the 🚩 (very similar to pentesterlab.com/blog/another...)

05.01.2025 03:02 β€” πŸ‘ 8    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
joernchen - Friday 13th @ 1Β°C
YouTube video by Tiny Club Berlin joernchen - Friday 13th @ 1Β°C

Have a great weekend and enjoy some tunes:

youtu.be/j_Md8_7mhOU

04.01.2025 13:46 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0
Preview
Subscribe to PentesterLab on Gumroad PentesterLab is an easy and great way to learn security code review and penetration testing. We provide vulnerable systems that can be used to test and understand vulnerabilities.

If your New Year’s resolution is to get better at web security code review, don’t miss our upcoming live training. Learn how to find vulnerabilities and strengthen your skills:

pentesterlab.gumroad.com

31.12.2024 22:49 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Learn Web Penetration Testing: The Right Way Learn Web Penetration Testing: The Right Way

Happy New Year!

pentesterlab.com/gift/xDzcB35... (3-month)
pentesterlab.com/gift/UBMtCsi... (3-month)
pentesterlab.com/gift/BWEYEme... (3-month)

31.12.2024 22:48 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Golang: because hackers haven’t given up on SQL injection in 2024...

30.12.2024 00:48 β€” πŸ‘ 11    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Preview
Learn Web Penetration Testing: The Right Way Learn Web Penetration Testing: The Right Way

πŸŽ…

pentesterlab.com/gift/v5kegJq... (3-month)
pentesterlab.com/gift/4VG6RYU... (3-month)
pentesterlab.com/gift/lsgfEwJ... (3-month)

24.12.2024 22:41 β€” πŸ‘ 9    πŸ” 3    πŸ’¬ 2    πŸ“Œ 0

Thank you! ☺️☺️☺️

23.12.2024 06:09 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Someone replied that I had the wrong handle for James, I fixed it but I cannot find the original message.

Thanks to whoever raised it.

18.12.2024 21:56 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

I put together a VERY limited (for now) list of web hackers in a Starter pack:

go.bsky.app/9uay4Ad

A lot of people are missing (I will try to add more as I find them) but make sure you follow people already in the list!

18.12.2024 00:54 β€” πŸ‘ 31    πŸ” 14    πŸ’¬ 3    πŸ“Œ 0
Post image

Cross-Site POST Requests Without a Content-Type Header by @lukejahnke
https://nastystereo.com/security/cross-site-post-without-content-type.html
#BBRENewsletter85

16.12.2024 15:05 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

❀It is why I am a huge fan and student of @pentesterlab.com and @snyff.pentesterlab.com
😱This lab show me that I was wrong, since several years, recommending to dev teams using a hash of the token as identifier in a revocation list.
πŸ₯°Now, I know the correct recommendation to provide.
#appsec #jwt

14.12.2024 16:31 β€” πŸ‘ 7    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
PentesterLab Blog: Reading Between the Lines: A Guide to Thoughtful Learning in Security Discover how to extract deeper insights from security content by going beyond surface-level understanding. This post explores a reflective approach to learning, helping you uncover patterns, improve y...

Want to level up your learning in security? πŸš€ Stop scrolling and start reflecting.

'Reading Between the Lines' challenges you to dig deeper:
1️⃣ What can I learn from this?
2️⃣ What patterns apply elsewhere?
3️⃣ Why didn’t I spot this?

The real breakthroughs come when you ask the right questions. πŸ’‘

πŸ‘‡

12.12.2024 03:16 β€” πŸ‘ 5    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
Post image 08.12.2024 21:28 β€” πŸ‘ 18    πŸ” 6    πŸ’¬ 2    πŸ“Œ 1

Yes, just a one off :/

07.12.2024 08:20 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Learn Web Penetration Testing: The Right Way Learn Web Penetration Testing: The Right Way

pentesterlab.com/gift/oNrufnj...

06.12.2024 22:31 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

I didn't want to spoil the solution

05.12.2024 22:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

The real question now is what kind of automation do you have in place to discover this code change/commit πŸ˜‰

05.12.2024 21:59 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

These are simple issues, but they illustrate how, by thinking of vulnerabilities as patterns rather than code, you can move from one language to another.

05.12.2024 21:57 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

printf 'first**|uname' | ruby hack.rb

05.12.2024 21:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 2    πŸ“Œ 0

@snyff.pentesterlab.com is following 19 prominent accounts