I found several interesting techniques that can help tricky situations, such as using the Connection Pool to make Client-Side Race Conditions easier!
Read the whole thing on my blog:
jorianwoltjer.com/blog/p/ctf/o...
I found several interesting techniques that can help tricky situations, such as using the Connection Pool to make Client-Side Race Conditions easier!
Read the whole thing on my blog:
jorianwoltjer.com/blog/p/ctf/o...
I found several interesting techniques that can help tricky situations, such as using the Connection Pool to make Client-Side Race Conditions easier!
Read the whole thing on my blog:
jorianwoltjer.com/blog/p/ctf/o...
* Nonce CSS leak in MathML: lab.ctbb.show/research/lea...
* HTML fun facts: lab.ctbb.show/research/htm...
* Nonce CSS leak in MathML: lab.ctbb.show/research/lea...
* HTML fun facts: lab.ctbb.show/research/htm...
Super excited to be part of this team, can't wait to see what crazy research is gonna come from this!
lab.ctbb.show/research/Exp...
Super excited to be part of this team, can't wait to see what crazy research is gonna come from this!
lab.ctbb.show/research/Exp...
Check out this crazy impact labeled as "working as intended":
blog.babelo.xyz/posts/cross-...
Check out this crazy impact labeled as "working as intended":
blog.babelo.xyz/posts/cross-...
All you need is an <iframe>, <object> or <embed> set to about:blank, with a dangling name= attribute. This vulnerable page should be iframable.
All you need is an <iframe>, <object> or <embed> set to about:blank, with a dangling name= attribute. This vulnerable page should be iframable.
I'm a bit late, but worth trying if you haven't already :D
Otherwise, my solution is below, it's a really fun technique that makes me re-evaluate all the .source checks I've seen before...
I'm a bit late, but worth trying if you haven't already :D
Otherwise, my solution is below, it's a really fun technique that makes me re-evaluate all the .source checks I've seen before...
Check out my writeup below:
jorianwoltjer.com/blog/p/ctf/i...
Check out my writeup below:
jorianwoltjer.com/blog/p/ctf/i...
But, it involves some very interesting Mutation XSS & DOM Clobbering fun combined with a CSP Bypass using the powerful SocketIO gadget.
Everything's explained in my writeup below!
jorianwoltjer.com/blog/p/ctf/i...
But, it involves some very interesting Mutation XSS & DOM Clobbering fun combined with a CSP Bypass using the powerful SocketIO gadget.
Everything's explained in my writeup below!
jorianwoltjer.com/blog/p/ctf/i...
Don't let that HTML-injection of yours wait!
jorianwoltjer.com/blog/p/resea...
Don't let that HTML-injection of yours wait!
jorianwoltjer.com/blog/p/resea...
Source JS:
gist.github.com/JorianWoltje...
URL:
greeting-chall.jorianwoltjer.com
Found a solution? Please DM to avoid spoilers, thanks!
Source JS:
gist.github.com/JorianWoltje...
URL:
greeting-chall.jorianwoltjer.com
Found a solution? Please DM to avoid spoilers, thanks!
*XSS on any localhost origin makes RCE possible on selenium!*
jorianwoltjer.com/blog/p/ctf/i...
*XSS on any localhost origin makes RCE possible on selenium!*
jorianwoltjer.com/blog/p/ctf/i...
jorianwoltjer.com/blog/p/ctf/i...
t.co/hox8lncSEN
t.co/hox8lncSEN
debug(DOMParser.prototype.parseFromString)
debug(DOMParser.prototype.parseFromString)
This one's about an tricky file write vulnerability on Windows in OBS. By crafting an image with very specific pixels, we can plant a backdoor on your PC all from an attacker's site by misconfiguring:
jorianwoltjer.com/blog/p/resea...
This one's about an tricky file write vulnerability on Windows in OBS. By crafting an image with very specific pixels, we can plant a backdoor on your PC all from an attacker's site by misconfiguring:
jorianwoltjer.com/blog/p/resea...
t=(S,...V)=>(e=$=>$?._?$:$?.map?$.map(e).join``:($+'').replace(/[&"'<>]/g,c=>`&#${c.charCodeAt()};`),(o=Object(S.reduce((a,p,i)=>a+e(V[i-1])+p)))._=1,o);
t=(S,...V)=>(e=$=>$?._?$:$?.map?$.map(e).join``:($+'').replace(/[&"'<>]/g,c=>`&#${c.charCodeAt()};`),(o=Object(S.reduce((a,p,i)=>a+e(V[i-1])+p)))._=1,o);
Here's a flexible PoC:
jorianwoltjer.com/blog/p/hacki...
Here's a flexible PoC:
jorianwoltjer.com/blog/p/hacki...
You can inject <input>s with form= pointing to the form's id= to add params, and make a <button> with form= and formaction= to change its action.
You can inject <input>s with form= pointing to the form's id= to add params, and make a <button> with form= and formaction= to change its action.
Check out the writeup below for details on how we could interact with local servers to exploit functionality
We found many client-side issues and discovered scary internet-exposed servers!
blog.jaisal.dev/articles/mcp
Check out the writeup below for details on how we could interact with local servers to exploit functionality
Check out the writeup, chat:
blog.jaisal.dev/articles/mcp
Check out the writeup, chat:
blog.jaisal.dev/articles/mcp
We found many client-side issues and discovered scary internet-exposed servers!
blog.jaisal.dev/articles/mcp
We found many client-side issues and discovered scary internet-exposed servers!
blog.jaisal.dev/articles/mcp