Twitter | Pretraživanje | |
Daniel Cuthbert
Next up... I want to be James Kettle when I grow up. He's singlehandedly made appsec sexy again after years of hardly any decent research. This little trick will make the bug bounty scene go mad.
Reply Retweet Označi sa "sviđa mi se" More
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
HTTP is stateless. Repeat after me. Oh wait. Someone put the kettle on and he's about to show how this isn't exactly the case. This topic scared James so much that it nearly put him off researching it.
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
Can I just say how DAMN refreshing that James starts off with a side no-one talks about: the fear we all have of the subject and failures along the way.
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
Now we all know RFCs right? RFC 2616 #4.4.3 says that if you get a message with both transfer-encoding AND content-length, the latter MUST be ignored. But who reads the docs??
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
The Kettle Break The Web© methodology. it's based upon timing and on influence.
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @PortSwigger
Ok Jesus wept bugbounty crowd, stop DMing me. Here's the simple trick. Buy a copy of and support Daffs growing fancy shirt collection
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
Attack one: bypassing front-end rules
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
Attack two: request reflection Cool thing here is that the request gets concatenated onto the other POST login request. That's sexy af!
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
The X-Forwarded headers are so misunderstood and at the same time so widely used.
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
PSA: F5 didn't seem to think that this was enough to issue a patch but just an advisory.
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
When James says "accidental" and "cache poisoning" and then making many accessing a well-known homepage automatically hit the burp collaborator, to grab an image Accidental, pfft
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
He is the Dwayne Johnson of infosec and bug bounties. Such a baller
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
The demo video truly shows how friggin amazing this research is and has earned him over 90,000 USD. Seriously I couldn't be more of an appsec fanboy at this moment in time
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Odgovor korisniku/ci @dcuthbert
The defensive side is actually the most important. We really need to push adoption of HTTP/2 overall. Many said WAFs solve this, no no no they will only ever be bandaids.
Reply Retweet Označi sa "sviđa mi se"