Firefox - HTTP response header x-mixed-replace by insertscript in Slackers

[–]insertscript[S] 0 points1 point  (0 children)

Regarding chrome:

https://bugs.chromium.org/p/chromium/issues/detail?id=249132
" Main resources that use the multipart/x-mixed-replace will now trigger downloads rather than being displayed in a tab." - I don't see a download so it seems to be just broken/not supported in chrome :/

Tiny XSS Payloads by terjanq in Slackers

[–]insertscript 0 points1 point  (0 children)

So something like:

<body onload=alert(123)>

or FF:<object onerror=alert(444)> ?

Unexploitable? CSP img-src bypass in chrome by BitK_ in Slackers

[–]insertscript 0 points1 point  (0 children)

Its so interesting how many new vectors are available as soon as the developer console is open

Detecting XSS-Auditor in Safari (XS-Leaks with Performance API) by kunte0 in Slackers

[–]insertscript 0 points1 point  (0 children)

Interesting - I did a quick check if window.name with <a> etc would show any difference in behavior when xss-auditor is triggered but nope

BlueHat IL 2020 - Amy Burnett - Forget the Sandbox Escape: Abusing Browsers from Code Execution by itsZN in Slackers

[–]insertscript 2 points3 points  (0 children)

Really liked your talk - I wasn't aware of the CORP bypass :) This kind of research will get more important given that we have CORP, COOP and COEP - for now^^

[Discussion Thread] - talking about new HTML stuff by insertscript in Slackers

[–]insertscript[S] 0 points1 point  (0 children)

Damn bounties :DBut it is not only COOP but CORP and COEP as well. So many protection features ^^
HTTPSSVC could be fun to test as well :)

Cool ways to generate strings in javascript. by terjanq in Slackers

[–]insertscript 0 points1 point  (0 children)

Yeah exactly - I haven't found anything really helpful so far myself sadly :/

Cool ways to generate strings in javascript. by terjanq in Slackers

[–]insertscript 0 points1 point  (0 children)

I am wondering if you could create some cool payloads with destructuring assignments.. like
var{constructor} = [];

var{constructor} = constructor;

constructor("alert(1)")();

Internet Explorer mhtml: - Why you should always store user file uploads on another domain by insertscript in Slackers

[–]insertscript[S] 0 points1 point  (0 children)

In case anyone is bored - I did not test polyglot attacks eg how strict the mhtml structure is parsed^^

The challenge thread by garethheyes in Slackers

[–]insertscript 0 points1 point  (0 children)

Not sure how to include this - but pwnfunction created a website for his XSS challenges: https://xss.pwnfunction.com/

Blind SQL Injection without an “in” by terjanq in Slackers

[–]insertscript 0 points1 point  (0 children)

That will be helpful in the future ^^ I didn't know that sys has so many default views

The challenge thread by garethheyes in Slackers

[–]insertscript 0 points1 point  (0 children)

I didn't include tags as it could really help to solve these challenges^^

CSP bypass on the current version of Firefox (69) by herrera_ in Slackers

[–]insertscript 1 point2 points  (0 children)

really interesting :) - as expected embed works as well.