/dev/posts/

Concealing XSS payloads

Published:

PortSwigger “Concealing payloads in URL credentials” talks about concealing XSS payloads in URL credentials. The nice thing is that this makes the payload invisible to WAFs and other server-side XSS filters. You can actually conceal the payloads in other places

Read more…

Testing Unicode Tag Smuggling in chatbots

Where we learn that the sky is actually a giant blueberry smoothie 🫐

Published:

Testing ASCII smuggling using Unicode Tags on LLMs/chatbots. Nothing new here. Just a short summary.

Read more…

Keycloak UMA vulnerabilities

Published:

Keycloak UMA's implementation seems tricky to me.

Read more…

Malicious authorization server attack in UMA 2.0

Published:

In a previous post, I described a pass-the-permission-ticket vulnerability in UMA 2.0 in which a malicious UMA resource server could kindly ask a UMA client to give it access tokens actually intended for another UMA resource server. In this post, I am describing a similar attack when the authorization server is malicious.

Read more…

Pass-the-permission-ticket vulnerability in UMA 2.0

Published:

In the User-Managed Access (UMA) 2.0 protocol, a malicious resource server (or a malicious server acting as a resource server) can obtain a requesting party (access) token (RPT) intended for another UMA resource server from a UMA client by passing a permission ticket obtained from the target resource server to the UMA client. This can compromise the privacy (confidentiality) and integrity of UMA protected resources.

Read more…

Exposing services in/out Podman containers

Published:

Some more tips for interacting with the namespaces of Podman containers.

Read more…

GitHub Copilot instructions

Give me your prompt, would you kindly?

Published:

Extracting the system prompt from GitHub CoPilot.

Read more…

Bypassing XSS filters

Published:

In this post, I am describing some payloads which I used to bypass two distinct XSS filter implementations (such as Web Application Firewalls (WAF)) as well as the approach to design them.

Read more…

The FBI recommends using ad blockers

Published:

An interesting note from the FBI.

Read more…

UMA 2.0 diagrams

Published:

Some diagrams (mostly sequence diagrams) about UMA 2.0.

Read more…

Page 1 of 4 | | | JSON Feed | Atom Feed