kire_devs_hacks's profile picture. I develop stuff and I hack things. #6 Microsoft MSRC 2024 Most Valuable Researcher. Two times consecutive #1 Dynamics 365/Power Platform security researcher.

Erik Donker

@kire_devs_hacks

I develop stuff and I hack things. #6 Microsoft MSRC 2024 Most Valuable Researcher. Two times consecutive #1 Dynamics 365/Power Platform security researcher.

Erik Donker รีโพสต์แล้ว

A little bit about what Shift Agents can do! Even Caido got hacked. Hahahah


Erik Donker รีโพสต์แล้ว

Small tip for the JavaScript reverse engineers out there, Chrome has a `debug()` function which triggers a breakpoint whenever its first argument is called. It even works on built-in methods, no more wrapping stuff in proxies :D debug(DOMParser.prototype.parseFromString)

J0R1AN's tweet image. Small tip for the JavaScript reverse engineers out there, Chrome has a `debug()` function which triggers a breakpoint whenever its first argument is called. It even works on built-in methods, no more wrapping stuff in proxies :D

debug(DOMParser.prototype.parseFromString)

Erik Donker รีโพสต์แล้ว

How did we (@AmirMSafari) earn $50k using the Punycode technique? I’ve published a detailed blog post about our recent talk, we included 3 attack scenarios, one of which poses a high risk of account takeover on any "Login with GitLab" implementation blog.voorivex.team/puny-code-0-cl…


Erik Donker รีโพสต์แล้ว

My first 10.0 CVE ;)

[1/7] 🚨 @Microsoft just patched CVE-2025-29813, a severe Azure DevOps vulnerability with a perfect CVSS score of 10.0! This flaw allowed attackers to swap short-term pipeline tokens for long-term ones, potentially extending their access. No user action needed. @AzureDevOps

gothburz's tweet image. [1/7] 🚨 @Microsoft just patched CVE-2025-29813, a severe Azure DevOps vulnerability with a perfect CVSS score of 10.0! This flaw allowed attackers to swap short-term pipeline tokens for long-term ones, potentially extending their access. No user action needed. @AzureDevOps


Erik Donker รีโพสต์แล้ว

Ok, so @slonser_, some of the folks in the CTBB discord, and I (@rhynorater) did a bit of follow-up on this and found a couple more useful primitives:

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

slonser_'s tweet image. Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? ->


Erik Donker รีโพสต์แล้ว

Awesome technique by @slonser_! With this method, you can leak sensitive data using just an 'img' tag, even if the target uses DOMPurify and CSS data exfiltration is not possible

AmirMSafari's tweet image. Awesome technique by @slonser_! With this method, you can leak sensitive data using just an 'img' tag, even if the target uses DOMPurify and CSS data exfiltration is not possible

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

slonser_'s tweet image. Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? ->


Erik Donker รีโพสต์แล้ว

Uh wow, ok, I guess we're back to image injection -> query param leak again. @shhnjk you seen this?

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

slonser_'s tweet image. Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? ->


Erik Donker รีโพสต์แล้ว

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

slonser_'s tweet image. Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? ->

Erik Donker รีโพสต์แล้ว

This one is from bugbounty target , funny... you will not able to bypass this year ago, Reply with your solution

0xMstar's tweet image. This one is from bugbounty target , funny... you will not able to bypass this year ago, Reply with your solution

Erik Donker รีโพสต์แล้ว

I wrote about Hackbots on the @Hacker0x01 site! It covers what they are, where they're at now, and most importantly where it's all heading 😊 I hope you'll check it out! Link in first reply.

rez0__'s tweet image. I wrote about Hackbots on the @Hacker0x01 site!

It covers what they are, where they're at now, and most importantly where it's all heading 😊 

I hope you'll check it out! Link in first reply.

Erik Donker รีโพสต์แล้ว

Blind CSS exfiltration attacks recently got a lot easier! Full details in this thread:

I think many people are familiar with the topic of blind CSS exfiltration, especially after the post by @garethheyes However, an important update has occurred since then, which I wrote below ->



Erik Donker รีโพสต์แล้ว

I think many people are familiar with the topic of blind CSS exfiltration, especially after the post by @garethheyes However, an important update has occurred since then, which I wrote below ->


Erik Donker รีโพสต์แล้ว

Somehow, Chrome 130+ started parsing the hostname from javascript URLs again and this can be used for a constrained XSS 🤯 challenges.ethiack.ninja/leak-the-secre… This was the second solution for the recent CTF challenge.


Erik Donker รีโพสต์แล้ว

👨‍💻 Can you spot the vulnerability? 👇 Let's see in the comments if you can figure out the CSP bypass to trigger an XSS 💉 🔗 Link in the comments to try your payload!

PinkDraconian's tweet image. 👨‍💻 Can you spot the vulnerability? 👇
Let's see in the comments if you can figure out the CSP bypass to trigger an XSS 💉
🔗 Link in the comments to try your payload!

Erik Donker รีโพสต์แล้ว

You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study. portswigger.net/research/saml-…


Erik Donker รีโพสต์แล้ว

At @nullcon Goa, Michael Hendrickx (@ndrix), Principal Security Research Manager at Microsoft, presented Project Dusseldorf: Finding Out-of-Band Vulnerabilities at Cloud Scale. Project Dusseldorf is an internal tool used by Microsoft’s red teams and application security teams to…

msftsecresponse's tweet image. At @nullcon Goa, Michael Hendrickx (@ndrix), Principal Security Research Manager at Microsoft, presented Project Dusseldorf: Finding Out-of-Band Vulnerabilities at Cloud Scale. Project Dusseldorf is an internal tool used by Microsoft’s red teams and application security teams to…

Erik Donker รีโพสต์แล้ว

For this challenge, it was necessary to abuse a discrepancy between the DOM and the rendered page in Firefox's cache handling 💽 👉 bugzilla.mozilla.org/show_bug.cgi?i… This allows to shift iframe rendering from one to another leading to a sandbox bypass 🔥 👉 mizu.re/post/an-18-yea…

With @Geluchat, we created a challenge for the @pwnmectf inspired by a bug he found in bug bounty a year ago! 🚀 If you have some time this weekend, give it a try! 👀 👉 pwnme.phreaks.fr

kevin_mizu's tweet image. With @Geluchat, we created a challenge for the @pwnmectf inspired by a bug he found in bug bounty a year ago! 🚀

If you have some time this weekend, give it a try! 👀

👉 pwnme.phreaks.fr


Erik Donker รีโพสต์แล้ว

I'm very happy to finally share the second part of my DOMPurify security research 🔥 This article mostly focuses on DOMPurify misconfigurations, especially hooks, that downgrade the sanitizer's protection (even in the latest version)! Link 👇 mizu.re/post/exploring… 1/2


Erik Donker รีโพสต์แล้ว

We just released a new article on how we made 50,000$ in #BugBounty by doing a really cool Software Supply Chain Attack🔥 🔗Link: landh.tech/blog/20250211-…

0xLupin's tweet image. We just released a new article on how we made 50,000$ in #BugBounty by doing a really cool Software Supply Chain Attack🔥

🔗Link: landh.tech/blog/20250211-…

Loading...

Something went wrong.


Something went wrong.