Tanner Prynn
@tannerprynn
Mostly appsec @[email protected]
ID: 19841574
01-02-2009 01:32:03
140 Tweet
232 Takipçi
120 Takip Edilen
I don’t talk about the work I do much but here’s a fun thing... security.googleblog.com/2018/10/google… The report we wrote is linked in the blog entry. @BearSSLnews @finderoffail David Wong Keegan Ryan Mason Hemmel NCC Group Research & Technology NCC Group Cryptography Services
Driving to the new Flying Potion album with Tanner Prynn in the high desert during sunset 👌
I’m the wrong person to ask; I’ve been offering NCC Group North America InfoSec to take it over (as have the other μC hackers), as it goes down for extended periods of time, repeatedly. Without their permission, I can’t stand up a reliable version. I wish they’d hand it off to me or Hans Nielsen.
Starting to write some blogs, here's one about Apple's App-Site Association standard that leaks web app routes (think robots.txt) NCC Group Research & Technology nccgroup.trust/us/about-us/ne…
Blog: A Novel CSP Bypass Using data: URI nccgroup.trust/us/about-us/ne… - or how to find an XSS payload which executes JavaScript from a data: URI, without using a <script> tag from a different domain. by Tanner Prynn
🗒️ An Opinionated Web #Pentesting Guide by Tanner Prynn Covers a broad range of topics including * Application mapping * Reviewing the design * AuthN/AuthZ * Frontend attacks, input handling, & crypto #bugbountytips #websecurity github.com/tprynn/web-met…
The comprehensive list of today's emerging threats, nOtWASP bottom 10: vulnerabilities that make you cry by James Kettle, Michael Stepankin and Gareth Heyes \u2028 portswigger.net/research/notwa…
Blog: Using UUIDs for Authorization is Dangerous (even if they’re cryptographically random) - UUIDv4 for unguessable IDs are not safe to use for traditional object-based access control - research.nccgroup.com/2021/05/10/usi… by Tanner Prynn