
Here's part 1, detailing how I hacked my company's own product using DNS rebinding: intruder.io/research/we-ha…
Daniel Thatcher
36 posts

@_danielthatcher
Researcher, and security person at @intruder_io. Hack dumber. He/him

Here's part 1, detailing how I hacked my company's own product using DNS rebinding: intruder.io/research/we-ha…




Excited to be talking about new DNS rebinding techniques at @BlackHatEvents #BHEU next week. The research for this talk will be released in 2 parts on the @intruder_io research blog - keep an eye out for part 1 on Thursday tinyurl.com/bdzxesd3





Prototype pollution can be a dangerous bug, but it's hard to detect in real-world scenarios without the source code. In the latest blog, our researcher, @_danielthatcher, discusses a new technique for detecting prototype pollution in black-box situations:hubs.li/Q01Cs9L70



GUIDs are everywhere - but there are hidden dangers when using them as they're designed for their uniqueness, not their security. Find out more in the latest blog from our research team: hubs.li/Q01pyz_r0 #guid #vulnerabilityscanning #CyberSecMonth

Just finished ElectroVolt talk at #DEFCON30. Was super glad to see the entire room full. Thanks a lot for coming AND supporting! ⚡️ Hope you enjoyed the talk and can use the knowledge in your day to day work. Feel free to check out electrovolt.io for POCs. #DC








Found a self-XSS? 🤨 Don't worry! Let's magically turn that into a valid XSS by sprinkling some CSRF on top of it! 🧙♂️ #bugbounty #bugbountytips 👇