Client-side hacking techniques

CSRFs and preflight requests

For me, client-side bugs were harder to understand than server-side bugs. For example, if you are exploiting an SQL injection, the case is simple. There’s: your burp/terminal the server that you are attacking. With client-side bugs, there’s: your burp/terminal your...

How XSS experts bypass CSP?

Gareth Heyes is one of the best in the world when it comes to XSS. Lately, he found a great XSS in Paypal. Initially, the report was rejected because PayPal requires you to bypass the CSP. Although he thinks that XSS should be accepted without Content Security Policy...

Cross-site WebSocket hijacking

WebSockets are an asynchronous way of communication between the browser and the server. It's the perfect fit for any live functionalities like chats or live statistics. From my experience, developers are often unaware of the risks associated with using WebSockets....

New XSS vectors

Recently, one of the XSS gurus - Gareth Heyes, found a few new XSS vectors. Many times I was annoyed when using the XSS cheat sheet. I was marking that I can only use a specific HTML tag, let’s say an “a” tag. The payload that I am supposed to use also uses the style...

Client-side path traversal

Client-side path traversal is a new name for me. Sam Curry mentioned it on his Twitter. I want to share it because I do see some use cases for this trick. It also means that we won't get rid of CSRFs that quickly. What is client-side path traversal about? Let's say...

Fuzzing WebSockets messages

A few issues ago I presented what is known as client-side WebSocket hijacking. However, this is not the only issue that can occur there. At the end, the backend still processes your input somehow. When it does, standard vulnerabilities with access control or injection...