attack ships on fire
Subscribe
Sign in
Home
Archive
About
Exploiting CSP Wildcards for Google Domains
TL;DR The Google developer documentation includes CSP examples which use domain wildcards (which have been widely cut & pasted), and additionally there…
Feb 29
•
attack ships on fire
1
Share this post
Exploiting CSP Wildcards for Google Domains
attackshipsonfi.re
Copy link
Facebook
Email
Note
Other
3
Exploiting Cacheable Responses
TL;DR The main browsers share their cache between Fetch requests and normal navigation.
Feb 20
•
attack ships on fire
2
Share this post
Exploiting Cacheable Responses
attackshipsonfi.re
Copy link
Facebook
Email
Note
Other
Exploiting Unsynchronised Clocks
TL;DR According to data from RIPE, over 40% of computers attached to the Internet have a few seconds of clock drift, which with the right combination of…
Feb 11
•
attack ships on fire
Share this post
Exploiting Unsynchronised Clocks
attackshipsonfi.re
Copy link
Facebook
Email
Note
Other
August 2023
Exploiting TRACE
TL;DR The presence of the TRACE method is generally considered to be at best an informational finding (and in isolation, I wouldn’t disagree with that).
Aug 4, 2023
•
attack ships on fire
Share this post
Exploiting TRACE
attackshipsonfi.re
Copy link
Facebook
Email
Note
Other
December 2022
Exploiting API Framework Flexibility
TL;DR The modern frameworks are often very flexible with what they accept, and will happily treat a POST with a JSON body as interchangeable with a URL…
Dec 17, 2022
•
attack ships on fire
1
Share this post
Exploiting API Framework Flexibility
attackshipsonfi.re
Copy link
Facebook
Email
Note
Other
November 2022
Exploiting CORS Misconfigurations
TL;DR If you can find an unrestricted CORS endpoint, that also responds to the HTTP override headers, then potentially you can use it to access…
Nov 26, 2022
•
attack ships on fire
2
Share this post
Exploiting CORS Misconfigurations
attackshipsonfi.re
Copy link
Facebook
Email
Note
Other
3
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts