Sven Morgenroth

1.9K posts

Sven Morgenroth banner
Sven Morgenroth

Sven Morgenroth

@asdizzle_

Needs stuff to hack, caffeine, oxygen and tea to survive. In that particular order. Security Research @netsparker

Katılım Temmuz 2015
85 Takip Edilen1.2K Takipçiler
Sven Morgenroth retweetledi
mongo
mongo@mongobug·
@GossiTheDog @threatspikeadam The public exploits use the vulnerabilities to execute external commands but that is not a requirement...
English
1
1
0
0
Sven Morgenroth
Sven Morgenroth@asdizzle_·
This should not happen I assume
GIF
English
0
1
8
0
Sven Morgenroth
Sven Morgenroth@asdizzle_·
@garethheyes Strange thing with <svg><script> is that it confuses the XSS Auditor. It's fine in the source code (no red), but is blocked nonetheless.
English
1
0
1
0
Sven Morgenroth retweetledi
mongo
mongo@mongobug·
A rare case of a bug found through a private bug bounty program being publicly acknowledged. Great to see :) kb.netapp.com/support/s/arti…
English
1
22
88
0
Sven Morgenroth
Sven Morgenroth@asdizzle_·
Doesn't work in chrome or FF
English
0
0
0
0
Sven Morgenroth
Sven Morgenroth@asdizzle_·
No PHP, no spaces, no $, no { }, bash only IFS=,;`cat<<<uname,-a`
English
0
44
135
0
Sven Morgenroth
Sven Morgenroth@asdizzle_·
Btw, the PHP closing tag can be omitted if you replace it with a semicolon `cat<<<'<?="uname\x20-a";'|php`
English
1
1
6
0
Sven Morgenroth
Sven Morgenroth@asdizzle_·
Command injection without space, $, {, } Python3 or PHP on server? uname`cat<<<'<?="\x20"?>'|php`-a uname`cat<<<'print("\x20")'|python3`-a
English
2
54
101
0
Sven Morgenroth
Sven Morgenroth@asdizzle_·
Why testing with XSS polyglots alone sucks
Sven Morgenroth tweet media
English
1
0
5
0
Sven Morgenroth
Sven Morgenroth@asdizzle_·
@Qab That looks cool, didn't test it yet. Maybe Phantom or Selenium have a way to detect it?
English
1
0
0
0