Thomas Houhou (@th0h0) 's Twitter Profile
Thomas Houhou

@th0h0

Security researcher | reported vulnerabilities to @X, @OpenAI, @AnthropicAI, @Swisscom and more | occasional speaker | cybersecurity student @ETH

ID: 1497006549583245316

linkhttps://www.thomashouhou.com/ calendar_today25-02-2022 00:33:44

25 Tweet

290 Followers

732 Following

Ryan M. Montgomery (@0dayctf) 's Twitter Profile Photo

autoSSRF (Automatic SSRF Testing) - Smart fuzzing on relevant SSRF GET parameters and Context-based dynamic payload generation - Repo: github.com/Th0h0/autossrf - Creator: Thomas Houhou - - #CyberSecurity #bugbountytips #infosec #CTF #tools

autoSSRF (Automatic SSRF Testing)
-
Smart fuzzing on relevant SSRF GET parameters and Context-based dynamic payload generation
-
Repo: github.com/Th0h0/autossrf
-
Creator: <a href="/Th0h0/">Thomas Houhou</a> 
-
-
#CyberSecurity #bugbountytips #infosec #CTF #tools
Thomas Houhou (@th0h0) 's Twitter Profile Photo

Bypass CSRF protections with Client Side Path Traversal, step-by-step 👇 1⃣ Identify any POST / PUT / DELETE XHR that takes in its path a user-controlled value 2⃣ Identify where this value is taken from (query parameters, cookies, ...) by looking at your browser dev tool's

Thomas Houhou (@th0h0) 's Twitter Profile Photo

Here are the slides of my talk at #AREA41: thomashouhou.com/slides-area41-… I might also soon write an associated blog post to give more details / discuss things i wouldn't have the time to discuss in a 45-minutes talk.

Thomas Houhou (@th0h0) 's Twitter Profile Photo

Couldn't be more happy for the outcome that this cookie tossing research ended-up to have! The whole idea of doing a talk came very randomly at the time and I wasn't even aware that I already had the sufficient material for it. "you can just do things" has never been more true :D