Daniel Thatcher
@_danielthatcher
Followers
643
Following
130
Media
1
Statuses
36
Researcher, and security person at @intruder_io. Hack dumber. He/him
Joined June 2018
And here’s part 2, presenting new techniques for reliable, split-second DNS rebinding in Chrome and Safari
intruder.io
This is the second post in a two-part series on DNS rebinding. In this post, I introduce new techniques for achieving reliable, split-second DNS rebinding in Chrome, Edge, and Safari when IPv6 is...
Here's part 1, detailing how I hacked my company's own product using DNS rebinding: https://t.co/cPAxwGU10O
1
0
10
Part 2 will be release on Wednesday, when I'm presenting the research at BHEU
0
0
1
Here's part 1, detailing how I hacked my company's own product using DNS rebinding: https://t.co/cPAxwGU10O
intruder.io
This post is the first in a two-part series on DNS rebinding in web browsers. In this post, I will talk about a bug we found in our own product which allowed us to retrieve low-privileged AWS...
Excited to be talking about new DNS rebinding techniques at @BlackHatEvents #BHEU next week. The research for this talk will be released in 2 parts on the @intruder_io research blog - keep an eye out for part 1 on Thursday
5
2
24
@BlackHatEvents @intruder_io I've been asked to hold off on the release of the first part until tomorrow, so sorry for the false alarm!
0
0
0
Excited to be talking about new DNS rebinding techniques at @BlackHatEvents #BHEU next week. The research for this talk will be released in 2 parts on the @intruder_io research blog - keep an eye out for part 1 on Thursday
1
1
7
A while ago I decided to try take on a big challenge and work out how to detect prototype pollution black-box. One thing I’m very happy with from this research is the simplicity of the solution I found
Prototype pollution can be a dangerous bug, but it's hard to detect in real-world scenarios without the source code. In the latest blog, our researcher, @_danielthatcher, discusses a new technique for detecting prototype pollution in black-box situations: https://t.co/sN8OIRxavn
0
0
4
Why do I know so many Dan's in infosec? Is there something about the name Dan? I strongly advise being cautious of your data around anyone named Dan, until we work this out.
9
3
15
The technique isn’t new, but the vast majority of pentesters I’ve spoken to don’t know about it, so I thought it worth sharing with an example from a pentest. I’ve also created a tool to help you exploit this issue
github.com
A tool to inspect and attack version 1 GUIDs. Contribute to intruder-io/guidtool development by creating an account on GitHub.
1
1
12
As a newbie pentester I read the RFC for GUIDs out of a fear that I wasn’t testing them correctly. A few years later, it paid off.
GUIDs are everywhere - but there are hidden dangers when using them as they're designed for their uniqueness, not their security. Find out more in the latest blog from our research team: https://t.co/tgDP4X3Ntx
#guid #vulnerabilityscanning #CyberSecMonth
1
2
8
This may in fact have been a good idea... but I think @mopman deserves some kind of recognition for a beautifully crafted social hack that it would appear has actually resulted in an amendment to an Act of Parliament. Nice work.
18
130
511
I was lucky enough to catch this talk at BH, and it was one of the highlights of the conference for me. Great research, and really well presented
Just finished ElectroVolt talk at #DEFCON30. Was super glad to see the entire room full. Thanks a lot for coming AND supporting! ⚡️ Hope you enjoyed the talk and can use the knowledge in your day to day work. Feel free to check out https://t.co/LN3zuQj06s for POCs. #DC
1
0
2
Heading off to Vegas for the first time. If you see me about, say hi. I’m the lanky blond British guy with round black glasses.
1
0
2
If you only need to read info rather than modify it, then the trick of loading the application in two separate iFrames works well. @iamnoooob writes about it here: https://t.co/JNUHKSTxWb
@avlidienbrunn has a great talk on this and other tricks:
0
0
1
This example works by using the self-XSS to set a session cookie with a limited path so that the self-XSS will still load when the victim logs back into their account. The self-XSS can then access the rest of the application as the victim, so is effectively regular XSS.
2
0
0
If you have stored self-XSS and login CSRF you can probably do something interesting, but you have to do slightly more than this tip says. Here's an example I put together against Moodle a few years ago:
blog.long.lat
Moodle allowed users to embed arbitrary HTML in their own dashboards, which are only visible to themselves, creating a situation which is equivalent to self-XSS. In this blog post I describe how it...
Found a self-XSS? 🤨 Don't worry! Let's magically turn that into a valid XSS by sprinkling some CSRF on top of it! 🧙♂️ #bugbounty #bugbountytips 👇
2
1
5
My lesson from the past few days… Ignore the logical part of your brain that says “Nah ignore that, it’s not gonna be vulnerable”!
3
8
44
My advice for this list is to always take to time to read everything on the top 10, and then go through the nominations as well. There's so much good research in these lists that you'll almost certainly find something awesome that you missed, or forgot about.
1
0
1
Thank you to everyone who voted for me and has shared the research. I'm really happy to have made the list.
1
0
0
Look Mum! I'm on PortSwigger!
The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2021! https://t.co/t3pMqnLt2T
1
0
4