Jinone
@jinonehk
Followers
2K
Following
559
Media
13
Statuses
158
Great experience collaborating with Akamai — the team is incredibly friendly and professional.
CVE-2025-66373: HTTP Request Smuggling Due to Invalid Chunked Body Size https://t.co/uviWpvUJBA
1
2
18
Great idea. I usually find fuzzing complete phone numbers quite complex. But this article inspires me to try guessing with a small dataset.
Just released a blog post "Deanonymizing Users at Scale: When Blocking Becomes an Oracle". In it, I describe an attack that made it possible to reveal the phone number of almost any user on one of the world’s largest social platforms: https://t.co/CuTMMmm1X0
0
0
2
🎉Announcing the latest research from our intern @maikypedia! In it, you'll learn all about Decompression Attacks, get to practice in custom-built labs and get some free @semgrep rules for detecting flaws. Check it out today! https://t.co/we46rcyptw
#appsec #doyensec #semgrep
0
18
56
Here's my x-correlation/json-injection research also in writing, thank you @ctbbpodcast! https://t.co/px1UcmvUTc
blog.criticalthinkingpodcast.io
Frans Rosen and Justin sit down to discuss and drop gold on X-correlation injection, with impacts and POCs ranging from JSON injection to RCE.
3
78
360
The whitepaper is live! Listen to the whispers: web timing attacks that actually work. Read it here -> https://t.co/cBRLNpOZ6y
portswigger.net
Websites are riddled with timing oracles eager to divulge their innermost secrets. It's time we started listening to them. In this paper, I'll unleash novel attack concepts to coax out server secrets
8
176
525
New blog! This time a high severity session takeover in Zoom worth $15,000. Read the story of how @sudhanshur705 , @BrunoModificato and I chained 2 completely useless XSS vulns to steal OAuth tokens, hijack browser permissions, and more: https://t.co/qVUgk5shqh
nokline.github.io
Here you can read all about my research and techniques I’ve gathered over time!
10
132
431
Wow! Thanks for sharing my work @albinowax, it's really nice to see that it's reached your attention. :)
Just discovered "Reset Tolkien" , a shiny new tool from @AethliosIK for cracking time-based secret tokens with the sandwich attack. Random-looking tokens can contain so many flaws, it's great to see more eyes on this area. https://t.co/lFBwChkneU
0
1
21
I'm thrilled to announce "Listen to the whispers: web timing attacks that actually work" will premiere at Black Hat USA! After nine months of running bulk timing attacks on thousands of live sites, I've got a lot to share :D #BHUSA @BlackHatEvents
https://t.co/YsrfM0SUm7
33
98
647
A public service announcement about #CVE-2024-4367 that we found in one of our pentests at Codean Labs. Make sure to update your #Firefox version to 126 and for #developers to update your PDF.js dependency. You can read our blog post for all details. https://t.co/4hJ0kSh87r
linkedin.com
#CVE-2024-4367 that Thomas Rinsma found on PDF.js has been patched! We want to thank the awesome people at Mozilla for their fast and great collaboration in getting this fixed, y'all rock. Make sure...
0
14
39
Enjoy our next blog post this time an SQL Injection on Apple’s Infra. Another win nets us a $25,000 bounty! 💻💰 #AppleSecurity #Research #bugbountytips #bugbounty
https://t.co/p09IH8bE86
Check out our latest research blog, including detailed overview of how we discovered an SQL injection vulnerability (+ nuclei template) in Masa/Mura CMS and Hacked into Apple's Infrastructure. https://t.co/QfrbwaHaBc
#AppleSecurity #Research #CyberSecuirty #BugBounty
0
35
185
Check out my write-up on a seemingly harmless and limited send() in GitHub (CVE-2024-0200) and how it could be used to obtain environment variables from a production container and to achieve remote code execution in GitHub Enterprise Server: https://t.co/jmjTTOxEGY
starlabs.sg
Earlier this year, in mid-January, you might have come across this security announcement by GitHub. In this article, I will unveil the shocking story of how I discovered CVE-2024-0200, a deceptively...
5
84
241
Just published a writeup on my account takeover vulnerability in ChatGPT, using a really cool web cache deception technique. Waited a while to finally publish this, enjoy :) https://t.co/P1vHoSzABX
nokline.github.io
Here you can read all about my research and techniques I’ve gathered over time!
27
208
712
Another great post on hoisting by @brutelogic! Missed this one when doing my own research. Interestingly the payload from my post work on the second example (undefined2.php) without hijacking atob %27-alert(1));function%20myObj(){}// https://t.co/c9z6NdvAXw
A good technique to deal with JSi based undefined scenarios. #XSS
https://t.co/0OyXUr2EUm
2
5
38
🧙♂️ CVE-2022-44268 - a vulnerability in ImageMagick that could lead to an arbitrary file read. How does it work? See here 👇
4
128
450
New XSS platform released. Support using your own domain name. Support webhook. Mates with the burpsuite extension to log the full request that triggers xss. For more, please visit. https://t.co/WtUhwVFo0j
#xsshunter #xss #hackerone #bugbounty #bugcrowd #bugbountytip #burpsuite
4
47
140
Arbitrary cache poisoning on all Akamai websites via 'Connection: Content-Length' - $50k in bounties well-earned by @jacopotediosi
https://t.co/UmlKIGsgWR
https://t.co/OFHGMVA2gP
medium.com
Introduction And Context
7
136
463
Hacking Google Drive integrations with a case study involving the use of CRLF and Request Pipelining to perform SSRF.
github.com
Contribute to httpvoid/writeups development by creating an account on GitHub.
Dropbox disclosed a bug submitted by @rootxharsh: https://t.co/qiEbDW51a8 - Bounty: $17,576 #hackerone #bugbounty
3
186
490