Category: Mix

CORS Bypass via dot
13
Apr
2023

CORS Bypass via dot

Origin 헤더와 ACAO(Access-Control-Allow-Origin) 헤더는 Cross-Origin 관계에서 데이터를 전달하고 수신하기 위한 헤더로 SOP(Same-Origin Policy)를 공식적으로 우회하기 위한 헤더입니다. 일반적으로 CORS라고 통용되어…

Ambassador Spotlight AWC Edition: remonsec
13
Apr
2023

Ambassador Spotlight AWC Edition: remonsec

What made you want to become an ambassador? It was around 2017 when I started hacking. I suffered from misguidance…

Broken Link Hijacking - How expired links can be exploited
13
Apr
2023

Broken Link Hijacking – How expired links can be exploited

Broken Link Hijacking (BLH) exists whenever a target links to an expired domain or page. Broken Link Hijacking comes in…

Detectify’s journey to an AWS multi-account strategy
13
Apr
2023

Detectify’s journey to an AWS multi-account strategy

In the past year, we’ve shifted our infrastructure from a single Amazon Web Services (AWS) account owned by our Platform…

Build your own serverless subscriber list with Go and AWS
13
Apr
2023

Build your own serverless subscriber list with Go and AWS

How to build your own newsletter list with DynamoDB and SES email sign up confirmations. You can now subscribe to…

Nahamsec interviews Jobert Abma
13
Apr
2023

Nahamsec interviews Jobert Abma

Note that during these interviews I also moderate thus quality may vary. Profile 🐝 cofounder HackerOne 29 years old started…

How to prevent PHP type juggling vulnerabilities
13
Apr
2023

How to prevent PHP type juggling vulnerabilities

How to prevent PHP type juggling vulnerabilities Source link

Yorkshire Post Building Demolition #3
13
Apr
2023

Yorkshire Post Building Demolition #3

Yorkshire Post Building Demolition #3 Source link

[tl;dr sec] #177 - AWS KMS Threat Model, DOM Invader, Forensics in the Cloud
13
Apr
2023

[tl;dr sec] #177 – AWS KMS Threat Model, DOM Invader, Forensics in the Cloud

Hey there, I hope you’ve been doing well! Easter Ah Easter, the American holiday where we celebrate the resurrection of…

The Hacker's Guide to Sneaking in Through the Back Door: A Second Order IDOR Adventure
13
Apr
2023

The Hacker’s Guide to Sneaking in Through the Back Door: A Second Order IDOR Adventure

The Hacker’s Guide to Sneaking in Through the Back Door: A Second Order IDOR Adventure Source link

Possible to spoof Origin in "Connected Sites"
13
Apr
2023

Possible to spoof Origin in “Connected Sites”

MetaMask disclosed a bug submitted by renniepak: https://hackerone.com/reports/1710564 – Bounty: $1000 Source link

Hacking APIs: Fuzzing 101
13
Apr
2023

Hacking APIs: Fuzzing 101

Hacking APIs: Fuzzing 101 Source link