appsecwiki's profile picture. An initiative to provide Application security related resources to Security Researchers. Account Maintained by @exploitprotocol , @prakharprasad , @abhibundela.

AppSec Wiki

@appsecwiki

An initiative to provide Application security related resources to Security Researchers. Account Maintained by @exploitprotocol , @prakharprasad , @abhibundela.

AppSec Wiki reposteó

We've added a huge new topic, on XXE (XML external entity) injection. Lots of new content and 9 new labs! portswigger.net/web-security/x…


AppSec Wiki reposteó

@appsecwiki has one of the most comprehensive and high quality appsec resources I have seen. I am using it now to learn AppSec appsecwiki.com


Added a DevSecOps section in @appsecwiki with some intial links. Will continue to add more resources as i learn more about it. Please add links/resources you are aware of. Thanks! appsecwiki.com/#/devsecops


AppSec Wiki reposteó

GitHub Desktop RCE (OSX) Bug Bounty writeup: pwning.re/2018/12/04/git… Thank you @GitHubSecurity for the bounty!


AppSec Wiki reposteó

Story of my two (but actually three) RCEs in SharePoint in 2018: soroush.secproject.com/blog/2018/12/s… - it all began with a simple question in Jan. 2018: "have you worked with ysoserial .net?" what a year! Glad blackhat.com/docs/us-17/thu… is in Top 10 Web Hacking Techniques of 2017 @pwntester


AppSec Wiki reposteó

New write up - "Reading ASP secrets for $17,000" - the really fun process of exploiting local file disclosure 🧐 samcurry.net/reading-asp-se…

samwcyo's tweet image. New write up - "Reading ASP secrets for $17,000" - the really fun process of exploiting local file disclosure 🧐
samcurry.net/reading-asp-se…

AppSec Wiki reposteó

There's a common misconception that 'X-Frame-Options: allow-from hxxp://example.com/' prevents framing. In fact, this isn't secure because Chrome doesn't support allow-from and never will: bugs.chromium.org/p/chromium/iss… So you can stop reporting Burp's XFO check as a false positive :)


AppSec Wiki reposteó

Hackers, minor cool insight that I gained some time ago and found a vulnerability with: when you're looking at an asset that may use a microservices architecture, look for IDOR vulnerabilities using path traversal. E.g. https://example/?id=1/../2. See thread. #TogetherWeHitHarder


AppSec Wiki reposteó

Remote Code Execution with EL injection #bugbounty #RCE betterhacker.com/2018/12/rce-in…


This is very interesting!

Here are the slides from me and @LittleJoeTables's talk "Getting Buzzed on Buzzwords" (a talk on using cloud tech to vastly improve pen-testing activities): drive.google.com/file/d/1N52DTd… CC @_devalias @riposte_sec @bishopfox



AppSec Wiki reposteó

A small gift from S2anta: @breenmachine showed how to abuse JasperReports for RCE (foxglovesecurity.com/2016/10/14/hac…) - now here's a single .JRXML file to achieve the same thing if no .JAR's are allowed: gist.github.com/v-p-b/dd95c72c…


We just shipped our first newsletter. You can subscribe to newsletter at appsecwiki.com/#/?id=newslett… if you have not already. Here is the link to this week newsletter: mailchi.mp/7d632ba1dc74/a… Thanks!


AppSec Wiki reposteó

My latest #bugbounty writeup: A $2,500 IDOR in New Relic that allowed me to run NRQL queries and retrieve data from any New Relic account. You can read it here: jonbottarini.com/2018/10/09/get… Let me know what you think! #TogetherWeHitHarder #HackerOne

jon_bottarini's tweet image. My latest #bugbounty writeup: A $2,500 IDOR in New Relic that allowed me to run NRQL queries and retrieve data from any New Relic account. You can read it here: jonbottarini.com/2018/10/09/get… Let me know what you think! #TogetherWeHitHarder #HackerOne

AppSec Wiki reposteó

An interesting #Google vulnerability that got me 3133.7 reward. sec-down.com/wordpress/?p=8…


AppSec Wiki reposteó

My new blog post. GoogleMeetRoulette: Joining random #Google meetings. Enjoy! martinvigo.com/googlemeetroul…


Loading...

Something went wrong.


Something went wrong.