We're continuing the OAuth series with yet more potential attacks. I'll show you two server-side OAuth attacks that are a bit less known yet, because they don’t need the user interaction, they are usually rated as criticals. I’ll also show you two other...
#86
WorstFit: Unveiling Hidden Transformers in Windows ANSI!
The Devcore team published an excellent research describing Windows’ best-fit algorithm to match characters that fall outside a specific charset. This results, among many other examples, in mapping a Yen character to a backslash, which, as you can likely imagine, is...
Red, Blue, and Purple AI – Jason Haddix
I find myself using AI quite frequently while hacking, yet my usage is still mostly asking ChatGPT or Copilot to explain something or, at best, generate code. While I don't believe that hacking bots will entirely replace humans soon, I do think that individuals...
Hackvector web
I feel like I'm sleeping on all the tools released by Gareth Heyes, but I believe they are incredibly powerful and could save me a lot of time. For example, the web version of Hackvector looks incredibly helpful for repetitive things like encoding or transforming...
How DDay Became The Most Valuable Hacker
Most Valuable Hacker at a HackerOne Live Hacking Event is the most prestigious award in the bug bounty space today. Douglas Day won it at H1-305 earlier this year in 2024 and has shared his experience in this blog post. I especially liked this part, which is very...
How a top hunter figures out a complex target
We all read bug bounty write-ups and learn from them. However, the bug is always the culmination of the bug hunting process. We never see the initial phase, where the hunter is confused with everything and only learns how to use and understand the parameters. Ron Chan...