YS (@yshahinzadeh) 's Twitter Profile
YS

@yshahinzadeh

Security enthusiastic, chess player

ID: 802058959

linkhttps://voorivex.team calendar_today04-09-2012 08:36:12

1,1K Tweet

13,13K Takipçi

388 Takip Edilen

YS (@yshahinzadeh) 's Twitter Profile Photo

first time participating in NahamCon. I’ll cover a practical attack scenario I've made $50K with. Hope everything goes well for me

first time participating in NahamCon. I’ll cover a practical attack scenario I've made $50K with. Hope everything goes well for me
AmirMohammad Safari (@amirmsafari) 's Twitter Profile Photo

Awesome technique by slonser! With this method, you can leak sensitive data using just an 'img' tag, even if the target uses DOMPurify and CSS data exfiltration is not possible

Awesome technique by <a href="/slonser_/">slonser</a>! With this method, you can leak sensitive data using just an 'img' tag, even if the target uses DOMPurify and CSS data exfiltration is not possible
Omid Rezaei (@omidxrz) 's Twitter Profile Photo

a few days ago i was able to leak OAuth code using a similar technique, i changed the referrer policy of the page using a meta tag and then injected an img, even though the referrer policy header was set, the browser followed the new policy from the meta tag

a few days ago i was able to leak OAuth code using a similar technique, i changed the referrer policy of the page using a meta tag and then injected an img, even though the referrer policy header was set, the browser followed the new policy from the meta tag
YS (@yshahinzadeh) 's Twitter Profile Photo

just wrote a blog post based on this technique and described the methodology to take advantage of it, the post also includes an easy-to-set-up testbed to practice with, hope you find it useful blog.voorivex.team/leaking-oauth-…

just wrote a blog post based on this technique and described the methodology to take advantage of it, the post also includes an easy-to-set-up testbed to practice with, hope you find it useful
blog.voorivex.team/leaking-oauth-…
AmirMohammad Safari (@amirmsafari) 's Twitter Profile Photo

We’ve created a lab to demonstrate how an OAuth token can be leaked using a referrer policy override. Check out the article and try the lab here github.com/VoorivexTeam/w…

YS (@yshahinzadeh) 's Twitter Profile Photo

The most powerful AI (o3 advanced reasoning) confirmed that this code is 100% safe. full conversation: chatgpt.com/share/6820f5e0…

The most powerful AI (o3 advanced reasoning) confirmed that this code is 100% safe. full conversation:
chatgpt.com/share/6820f5e0…
Omid Rezaei (@omidxrz) 's Twitter Profile Photo

YS and I created two postMessage challenges based on real-world cases, it's commonly used by developers to secure postMessages this is the first one, can you exploit it?

<a href="/YShahinzadeh/">YS</a> and I created two postMessage challenges based on real-world cases, it's commonly used by developers to secure postMessages
this is the first one, can you exploit it?
Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

What do you get when you mix punycode and 0-click account takeover? A talk you absolutely don’t want to miss. @yshahinzadeh & @amirmsafari are teaming up at #NahamCon2025 to walk you through a wild exploit chain 🔥 🗓️ May 23 📍 nahamcon.com

What do you get when you mix punycode and 0-click account takeover?
A talk you absolutely don’t want to miss.
@yshahinzadeh &amp; @amirmsafari are teaming up at #NahamCon2025 to walk you through a wild exploit chain 🔥

🗓️ May 23
📍 nahamcon.com
YS (@yshahinzadeh) 's Twitter Profile Photo

How did we (AmirMohammad Safari) earn $50k using the Punycode technique? I’ve published a detailed blog post about our recent talk, we included 3 attack scenarios, one of which poses a high risk of account takeover on any "Login with GitLab" implementation blog.voorivex.team/puny-code-0-cl…

AmirMohammad Safari (@amirmsafari) 's Twitter Profile Photo

In our NahamCon talk, we demonstrated how punycode email addresses can impact OAuth implementations. MySQL + GitLab OAuth by default can lead to zero-click account takeover. 🔍 Check out the demo app here: github.com/VoorivexTeam/w…

YS (@yshahinzadeh) 's Twitter Profile Photo

I got this from Twitter. they've had some delays in triage and payment, but their communication has been professional overall :]

I got this from Twitter. they've had some delays in triage and payment, but their communication has been professional overall :]
Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

This #NahamCon2025 talk has generated over $50,000 in bounties for YS and a few other hackers: Puny-Code, 0-Click Account Takeover. 🎥👉🏼youtu.be/4CCghc7eUgI

This #NahamCon2025 talk has generated over $50,000 in bounties for <a href="/YShahinzadeh/">YS</a> and a few other hackers: Puny-Code, 0-Click Account Takeover. 

🎥👉🏼youtu.be/4CCghc7eUgI
Coffin (@coffinxp7) 's Twitter Profile Photo

After going through all the comments and questions about setting up IDN domains and using Punycode based emails, I finally made a video that covers everything step by step. I’m confident this will help many of you land some serious bounties! youtu.be/Cj1sOFHDClM?si…