@d0nutptr
d0nut 🦀
5 years
Here it is! My blog post on Sequential Import Chaining (and tool: ) #bugbountytip #security
14
205
453

Replies

@d0nutptr
d0nut 🦀
5 years
This is the most proud of a blog post I’ve ever been :)
2
3
26
@Rhynorater
Justin Gardner
5 years
@d0nutptr Ahhh there it is. Nice work, man! Genius attack :)
1
0
1
@d0nutptr
d0nut 🦀
5 years
@Rhynorater I figured I teased you long enough :p
0
0
2
@michielprins
Michiel Prins
5 years
@d0nutptr very well written! 🔥
1
0
2
@d0nutptr
d0nut 🦀
5 years
@michielprins Thank you!!!
0
0
1
@yappare
yappare
5 years
@d0nutptr @NahamSec Is stealing csrf token considered as harmful?
2
0
3
@d0nutptr
d0nut 🦀
5 years
0
0
1
@PerseidRocks
Carry On Wayward Son
5 years
@d0nutptr CSS Sequential Import Chaining might work better for the article title.. definitely a nice technique though
1
0
1
@d0nutptr
d0nut 🦀
5 years
@PerseidRocks True... but i wrote an article called “exfiltration via css injection” previously so i kinda wanted to play off that title :p
0
0
0
@cgvwzq
Pepe Vila
5 years
@d0nutptr cool work! :)
1
0
1
@d0nutptr
d0nut 🦀
5 years
@cgvwzq You too! XD
0
0
0
@nbk_2000
₦฿₭ - Paw / Pwn / Purr
5 years
@d0nutptr Really great work! In case outbound ports are filtered for the victim, I'm assuming you could use 2 different hostnames ( and ) instead of different ports to get around the browser connection limit you mentioned. Right?
1
0
1
@d0nutptr
d0nut 🦀
5 years
@nbk_2000 Yup! That should be sufficient :) the tool supports that already too!
1
0
0
@Yassineaboukir
Yassine Aboukir 🐐
5 years
@d0nutptr Awesome write-up and technique 🙌
0
0
1
@_ayoubfathi_
Ayoub FATHI 阿尤布 🇵🇸
5 years
@d0nutptr that's a nice one dude:)
0
0
1
@detroitsmassh
detroitsmash
5 years
0
0
3
@0xacb
André
5 years
@d0nutptr Sick!! 🔥🔥🔥
0
0
1
@bbuerhaus
Brett Buerhaus
5 years
@d0nutptr D0nut the css wizard. Love the writeup, great work as always
2
0
2
@0xV3n0m1911
Himanshu
5 years
0
0
0
@shaddycls
Sherab Giovannini
5 years
@d0nutptr Amazing work! and made in Rust! <3
0
0
1