xEHLE
@xehle_
true(1)
ID: 981389449
https://blog.p1.gs/ 30-11-2012 22:39:14
386 Tweet
1,1K Followers
2,2K Following
Our team recently used a novel technique to increase the impact of what seemed to be only a blind SSRF. This novel technique involving HTTP redirect loops and incremental status codes led to full HTTP response leakage. Read more on Searchlight Cyber blog here: slcyber.io/assetnote-secu…
Used this trick go find a bug in a big AI app where I could read everyone’s private conversations! TLDR: You can do greater/less-than queries against UUIDs because in Supabase they’re stored like 128-bit integers Thanks to Joseph Thacker and Justin Gardner for the shoutout on the pod!
New blog post about all the fun I had red teaming at National CCDC this year! Covers some of the fun we had this year specifically relating to the web side of things, as well as some tips and resources for competitors & those interested in participating sshell.co/red-teaming-at…
When applying for a job at McDonald's, over 90% of franchises use "Olivia," an AI-powered chatbot. We (Ian Carroll and I) discovered a vulnerability that could allow an attacker to access the over 64 million chat records using the password "123456". ian.sh/mcdonalds