_danielthatcher Profile Banner
Daniel Thatcher Profile
Daniel Thatcher

@_danielthatcher

Followers
643
Following
130
Media
1
Statuses
36

Researcher, and security person at @intruder_io. Hack dumber. He/him

Joined June 2018
Don't wanna be here? Send us removal request.
@_danielthatcher
Daniel Thatcher
2 years
And here’s part 2, presenting new techniques for reliable, split-second DNS rebinding in Chrome and Safari
Tweet card summary image
intruder.io
This is the second post in a two-part series on DNS rebinding. In this post, I introduce new techniques for achieving reliable, split-second DNS rebinding in Chrome, Edge, and Safari when IPv6 is...
@_danielthatcher
Daniel Thatcher
2 years
Here's part 1, detailing how I hacked my company's own product using DNS rebinding: https://t.co/cPAxwGU10O
1
0
10
@_danielthatcher
Daniel Thatcher
2 years
Part 2 will be release on Wednesday, when I'm presenting the research at BHEU
0
0
1
@_danielthatcher
Daniel Thatcher
2 years
Here's part 1, detailing how I hacked my company's own product using DNS rebinding: https://t.co/cPAxwGU10O
Tweet card summary image
intruder.io
This post is the first in a two-part series on DNS rebinding in web browsers. In this post, I will talk about a bug we found in our own product which allowed us to retrieve low-privileged AWS...
@_danielthatcher
Daniel Thatcher
2 years
Excited to be talking about new DNS rebinding techniques at @BlackHatEvents #BHEU next week. The research for this talk will be released in 2 parts on the @intruder_io research blog - keep an eye out for part 1 on Thursday
5
2
24
@_danielthatcher
Daniel Thatcher
2 years
@BlackHatEvents @intruder_io I've been asked to hold off on the release of the first part until tomorrow, so sorry for the false alarm!
0
0
0
@_danielthatcher
Daniel Thatcher
2 years
Excited to be talking about new DNS rebinding techniques at @BlackHatEvents #BHEU next week. The research for this talk will be released in 2 parts on the @intruder_io research blog - keep an eye out for part 1 on Thursday
1
1
7
@_danielthatcher
Daniel Thatcher
3 years
A while ago I decided to try take on a big challenge and work out how to detect prototype pollution black-box. One thing I’m very happy with from this research is the simplicity of the solution I found
@intruder_io
Intruder
3 years
Prototype pollution can be a dangerous bug, but it's hard to detect in real-world scenarios without the source code. In the latest blog, our researcher, @_danielthatcher, discusses a new technique for detecting prototype pollution in black-box situations: https://t.co/sN8OIRxavn
0
0
4
@mopman
mopman
6 years
Why do I know so many Dan's in infosec? Is there something about the name Dan? I strongly advise being cautious of your data around anyone named Dan, until we work this out.
9
3
15
@_danielthatcher
Daniel Thatcher
3 years
The technique isn’t new, but the vast majority of pentesters I’ve spoken to don’t know about it, so I thought it worth sharing with an example from a pentest. I’ve also created a tool to help you exploit this issue
Tweet card summary image
github.com
A tool to inspect and attack version 1 GUIDs. Contribute to intruder-io/guidtool development by creating an account on GitHub.
1
1
12
@_danielthatcher
Daniel Thatcher
3 years
As a newbie pentester I read the RFC for GUIDs out of a fear that I wasn’t testing them correctly. A few years later, it paid off.
@intruder_io
Intruder
3 years
GUIDs are everywhere - but there are hidden dangers when using them as they're designed for their uniqueness, not their security. Find out more in the latest blog from our research team: https://t.co/tgDP4X3Ntx #guid #vulnerabilityscanning #CyberSecMonth
1
2
8
@dylanbeattie
Dylan Beattie has gone to BlueSky
3 years
This may in fact have been a good idea... but I think @mopman deserves some kind of recognition for a beautifully crafted social hack that it would appear has actually resulted in an amendment to an Act of Parliament. Nice work.
@smithsam
Sam
3 years
Poor Bobby Tables… https://t.co/ggJJ7HjcKS
18
130
511
@_danielthatcher
Daniel Thatcher
3 years
I was lucky enough to catch this talk at BH, and it was one of the highlights of the conference for me. Great research, and really well presented
@aaditya_purani
Aaditya Purani
3 years
Just finished ElectroVolt talk at #DEFCON30. Was super glad to see the entire room full. Thanks a lot for coming AND supporting! ⚡️ Hope you enjoyed the talk and can use the knowledge in your day to day work. Feel free to check out https://t.co/LN3zuQj06s for POCs. #DC
1
0
2
@_danielthatcher
Daniel Thatcher
3 years
Heading off to Vegas for the first time. If you see me about, say hi. I’m the lanky blond British guy with round black glasses.
1
0
2
@_danielthatcher
Daniel Thatcher
3 years
If you only need to read info rather than modify it, then the trick of loading the application in two separate iFrames works well. @iamnoooob writes about it here: https://t.co/JNUHKSTxWb @avlidienbrunn has a great talk on this and other tricks:
0
0
1
@_danielthatcher
Daniel Thatcher
3 years
This example works by using the self-XSS to set a session cookie with a limited path so that the self-XSS will still load when the victim logs back into their account. The self-XSS can then access the rest of the application as the victim, so is effectively regular XSS.
2
0
0
@_danielthatcher
Daniel Thatcher
3 years
If you have stored self-XSS and login CSRF you can probably do something interesting, but you have to do slightly more than this tip says. Here's an example I put together against Moodle a few years ago:
blog.long.lat
Moodle allowed users to embed arbitrary HTML in their own dashboards, which are only visible to themselves, creating a situation which is equivalent to self-XSS. In this blog post I describe how it...
@intigriti
Intigriti
3 years
Found a self-XSS? 🤨 Don't worry! Let's magically turn that into a valid XSS by sprinkling some CSRF on top of it! 🧙‍♂️ #bugbounty #bugbountytips 👇
2
1
5
@_xpn_
Adam Chester 🏴‍☠️
3 years
My lesson from the past few days… Ignore the logical part of your brain that says “Nah ignore that, it’s not gonna be vulnerable”!
3
8
44
@_danielthatcher
Daniel Thatcher
4 years
My advice for this list is to always take to time to read everything on the top 10, and then go through the nominations as well. There's so much good research in these lists that you'll almost certainly find something awesome that you missed, or forgot about.
1
0
1
@_danielthatcher
Daniel Thatcher
4 years
Thank you to everyone who voted for me and has shared the research. I'm really happy to have made the list.
1
0
0
@_danielthatcher
Daniel Thatcher
4 years
Look Mum! I'm on PortSwigger!
@PortSwiggerRes
PortSwigger Research
4 years
The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2021! https://t.co/t3pMqnLt2T
1
0
4