Ryan Barnett (@ryancbarnett) 's Twitter Profile
Ryan Barnett

@ryancbarnett

Web App Defender | Bug Hunter/Triager | Purple Team | Detection Engineering | Author | Principal Security Researcher @Akamai_research | OWASP Project Leader ✝️

ID: 135907568

linkhttp://tacticalwebappsec.blogspot.com calendar_today22-04-2010 14:27:56

4,4K Tweet

4,4K Followers

313 Following

Ryan Barnett (@ryancbarnett) 's Twitter Profile Photo

Another example I just looked at with an XSS attack that is using Right Double Quotation Mark visual confusable for the ASCII Quotation Mark codepoints.net/U+201D util.unicode.org/UnicodeJsps/co…

Another example I just looked at with an XSS attack that is using Right Double Quotation Mark visual confusable for the ASCII Quotation Mark
codepoints.net/U+201D
util.unicode.org/UnicodeJsps/co…
Akamai Technologies (@akamai) 's Twitter Profile Photo

Compromised VPNs have been traditionally only used for initial access. Read how much more damage can be done by threat actors performing VPN post-exploitation: ow.ly/3Q9F50SSZNq

Compromised VPNs have been traditionally only used for initial access. Read how much more damage can be done by threat actors performing VPN post-exploitation: ow.ly/3Q9F50SSZNq
Ryan Barnett (@ryancbarnett) 's Twitter Profile Photo

Another example related to our Bug Bounty Village workshop. We didn't have time to include this example but I have seen "spelling" data manipulation be abused for WAF obfuscation both server and also client-side in JS. t.ly/Asg7I

Ryan Barnett (@ryancbarnett) 's Twitter Profile Photo

For those that attended Angel Hacker and I's Bug Bounty Village workshop and liked it, here is a great mindmap type of view for Unicode normalization issues that you can apply to #BugBounty #bugbountytips

Ryan Barnett (@ryancbarnett) 's Twitter Profile Photo

A shoutout to Anton for this html entity encoding trick. We highlighted it in Angel Hacker and I's Bug Bounty Village workshop (t.ly/Asg7I) We have a YesWeHack ⠵ DOJO lab for it here: dojo-yeswehack.com/challenge/play…

Ryan Barnett (@ryancbarnett) 's Twitter Profile Photo

Here is the YesWeHack ⠵ DOJO lab that Angel Hacker made that demo's this issue in an XSS attack - dojo-yeswehack.com/challenge/play… This was part of our Bug Bounty Village workshop: t.ly/Asg7I

gr3pme (@gr3pme) 's Twitter Profile Photo

This week's Critical Thinking - Bug Bounty Podcast HackerNotes has dropped, covering a bunch of takeaways with Lupin and Justin from Google's BugSwat event in Vegas! Check it out below: blog.criticalthinkingpodcast.io/p/hackernotes-…

Ryan Barnett (@ryancbarnett) 's Twitter Profile Photo

LOVE it Lenny Zeltser! I agree with this mindset and I outlined many of these concepts for defend web applications in the first section of my book "Web Application Defender's Cookbook: Preparing the Battlespace". BTW - I also quoted Richard Bejtlich 💾 🇺🇦 as well 👊 #DetectionEngineering

LOVE it <a href="/lennyzeltser/">Lenny Zeltser</a>! I agree with this mindset and I outlined many of these concepts for defend web applications in the first section of my book "Web Application Defender's Cookbook: Preparing the Battlespace". BTW - I also quoted <a href="/taosecurity/">Richard Bejtlich 💾 🇺🇦</a> as well 👊 #DetectionEngineering
Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

🚀 New Shazzer update shazzer.co.uk - Added tool tips and help for placeholders - Added new UI to separate simple/advanced placeholders - Added new placeholders to use fromCodePoint method - Displayed warning when using raw characters inside JS strings

🚀 New Shazzer update

shazzer.co.uk

- Added tool tips and help for placeholders
- Added new UI to separate simple/advanced placeholders
- Added new placeholders to use fromCodePoint method
- Displayed warning when using raw characters inside JS strings
Akamai Security Intelligence Group (@akamai_research) 's Twitter Profile Photo

Akamai's SIRT discovered a zero-day command injection RCE vulnerability in the brightness function of AVTECH CCTV cameras. This was being used as part of a Mirai botnet campaign abusing several other vulnerabilities as well. Full write-up including IOCs: akamai.com/blog/security-…

Akamai's SIRT discovered a zero-day command injection RCE vulnerability in the brightness function of AVTECH CCTV cameras.

This was being used as part of a Mirai botnet campaign abusing several other vulnerabilities as well.

Full write-up including IOCs:
akamai.com/blog/security-…