Server-side hacking techniques

3 Nginx tricks for auth bypass

Understanding Nginx and its potential misconfigurations can lead you to find many vulnerabilities. In this article, I’ll show you Nginx tricks I learnt from a CTF I played at the 37C3 conference. It’s not a task writeup - I’ll focus on parts of the task that can be...

EJS Vulnerabilities

As you know, I’m a big fan of CTFs. I think we can learn a great deal from them. At the very least, they give us a lot of cool writeups. In this one, for example, Huli described a way to turn this, at first, securely-looking code, into an RCE. The reason is that, in...

Novel ways of HTTP request splitting

CRLF is a commonly known vulnerability type - you send a request with CRLF characters and you look if you can they are reflected without sanitisation in the response. Whereas this scenario is the easiest to detect, it’s not the only one. There’s also a possibility...