Borna Nematzadeh
@LogicalHunter
Followers
3K
Following
2K
Media
16
Statuses
237
Security Researcher
Joined November 2020
I've published my new research, "Exploiting Number Parsers in JavaScript". In this article, I’ve discussed the number parsers in JavaScript and the different attack scenarios you might encounter. https://t.co/VMVqHF3j2q
logicalhunter.me
Summary This research will explore the following topics: An overview of number parsers in JavaScript There are two general ways to parse numbers in JavaScript: using the Number Constructor and its...
6
21
122
New Google VRP writeup "XSS in Google IDX Workstation" for a bounty of $22,500 by @sudhanshur705: https://t.co/16Fz5H5f0R
sudistark.github.io
Technical breakdown of an XSS vulnerability in Google IDX Workstation.
0
24
128
@GoogleVRP disclosed my most impactful client-side report to date: https://t.co/yGZJrSZEbe TL;DR An attacker could've gained access to Gemini Code Assist Tools (GitLab, GitHub etc.) configured by the victim
bughunters.google.com
Found a security vulnerability? Discover our forms for reporting security issues to Google: for the standard VRP, Google Play, and Play Data Abuse.
3
33
130
"AI Agents for Offsec with Zero False Positives" by @moyix, a journey on how we managed to get 0 FPs with XBOW. You can find the slides for his BH talk here: https://t.co/vFEfm5HkxT
1
57
248
An Introduction to using Artificial Intelligence (AI) for Vulnerability Research
8
227
747
❌ Eliminating almost all exploitable web vulnerabilities? This blog post covers how the Google security team implemented a high-assurance web framework to achieve this goal for its services, and what this framework's most important characteristics are. https://t.co/dohOwvCOtz
bughunters.google.com
Learn more about how Google has created and deployed a high-assurance web framework that almost completely eliminates exploitable web vulnerabilities.
4
45
176
Write-up of my v8 bug: Critical type confusion in V8's Turboshaft compiler allowed stale pointers to bypass GC, leading to exploitable memory corruption. Full details + PoC:
bushido-sec.com
V8 Turboshaft Load Elimination Type Confusion Vulnerability (CVE-2024-6773)Exploitable Memory Corruption via Garbage Collection Race Condition Executive Summary A critical type confusion vulnerabil...
2
60
243
It's an honor that my research, Exploiting Number Parsers in JS, has been nominated for the Top Ten Web Hacking Techniques of 2024. I discussed how discrepancies in JS number parsers could be used to carry out DoS attacks. If you find it interesting, please vote for it!
Voting is now live for the Top Ten (New) Web Hacking Techniques of 2024! Browse the nominations & cast your votes here:
3
4
52
Just discovered 10 memory corruption vulnerabilities in the popular Mongoose Web Server (11k stars on GitHub) by fuzzing its embedded TLS stack protocol with @aflplusplus. More technical details here: https://t.co/AzK6USwACO
0
44
222
There is no prize to perfection, only an end to pursuit
1
0
15
Released a new extension :) - https://t.co/sphNJdvUyt for postMessages from all_frames. - detects the scope of sent messages. - origins that are insecure, will be prefixed with UNSAFE. - detects if a website does not check .origin - MessageChannel API https://t.co/56gtuIU7qw
chromewebstore.google.com
Extension to log postMessage()
3
25
124
Awesome research!🔥
I'm thrilled to finally share my research on HTML parsing and DOMPurify at @GreHack 2024 📜 The research article is available here: https://t.co/GIqy0hTCdR The slides are available here: https://t.co/97iiZgoJqb 1/3
1
0
13
I created a small tool to automatically set breakpoints in Chrome using the CDP (Chrome DevTools Protocol). It’s still in beta, but I’m actively working on a complete version.. https://t.co/8Hn5XgAWs1
4
26
155
Here's a code snippet that as far as I can tell pretty much solves prototype pollution. It's based on https://t.co/VkshO7Wpyh, and after running it you can access an object's prototype with object[Symbol.instanceProto], and object["__proto__"] will be undefined.
4
4
86
Project Zero blog: LLMs find 0days now! 👀 And: our fuzzer setup did *not* reproduce it! https://t.co/xz6j2fzrWe
9
150
608
I have updated the list of custom filters for Logger++. The new additions include: . New API Style (gRPC-Web) . Improved previous filters . Exposed API keys custom filters . New filters for API vulnerabilities https://t.co/XfoRQjvHmu
github.com
A comprehensive list of custom filters for Logger++ to identify various vulnerabilities in different API styles - bnematzadeh/LoggerPlusPlus-API-Filters
3
8
68
Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! https://t.co/YzYcwxOGBn Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code
37
650
2K
#TypeScript Remote Procedure Call (tRPC) Security Research: Hunting for Vulnerabilities in Modern APIs, a nice read from @LogicalHunter: https://t.co/ub4Yrb43rD Vulnerable tRPC playground: https://t.co/6Qv9qGqvdx
0
11
40
New blog alert! 🚨 Delve into an intriguing browser based web attack vector I stumbled upon that is widespread and can be used to perform ATO. I call it Cross Window Forgery. 🫧🌊🌪️🌀 https://t.co/0bXTyl2JVH
4
51
154