Dmitriy Shagov

585 posts

Dmitriy Shagov

Dmitriy Shagov

@dmi3sh

Katılım Ekim 2011
607 Takip Edilen2K Takipçiler
Dmitriy Shagov
Dmitriy Shagov@dmi3sh·
@BuildHackSecure @GodfatherOrwa @Hacker0x01 @h4x0r_dz That's BS. There are no sanctions against doing this type of business. There was no legal pretext. "Sanctions" is not some vague thing that gives one an excuse to do all kinds of bs and steal researchers money. What they did was not motivated by any OFAC decree.
English
1
0
1
344
Adam Langley
Adam Langley@BuildHackSecure·
@GodfatherOrwa @Hacker0x01 @h4x0r_dz Can’t comment about anything else but remember H1 is an American company, there’s sanctions against Russia which will stop them trading so that’s out of their control.
English
3
0
11
7.5K
Dmitriy Shagov
Dmitriy Shagov@dmi3sh·
@MitchellAmador Big respect for diving into history and Cuban missile crisis analogy. It is very pleasing to see someone willing to speak calmly about such topic in the world full of hysteria.
English
0
0
0
215
Mitchell Amador
Mitchell Amador@MitchellAmador·
Something underappreciated on the political scene: missile technology has advanced such that ballistic goes farther and faster, with more compact launch platforms, and nuclear arms have become smaller as well. If Russian missile ships are in Cuba again, what do you think that means? The Cuban missile crisis erupted due to the same factors present today, except now there appears little willingness by the disputes to off-ramp from what’s to come. Not going to lie that’s not great for all us good and simple people.
English
2
0
5
1.9K
Dmitriy Shagov retweetledi
0xDjango
0xDjango@0xDjangoOnChain·
In November, I submitted a critical bug to Cronos (@cronosapp) which they downplayed and have since been kicked off Immunefi. Here's some info about the bug and an example of how projects can simply not pay a fair amount. Report: gist.github.com/fatherGoose1/6… tl;dr: - It's a simple staking contract where you stake your TONIC and receive xTonic at the current exchange rate. - The vulnerability lies in a function called performConversionForERC20() which allows anyone to convert other tokens held by the contract into TONIC. - This function is vulnerable to reentrancy because the caller sets an arbitrary swap path and can inject a malicious token in the middle to gain control of execution. - The contract determines the estimated amount of TONIC that should be received by the swap, and any extra goes to the caller as a reward. - But since there is reentrancy, the caller can also STAKE their TONIC prior to the above function completion. - The caller's stake is honored AND they are transferred back their TONIC, essentially receiving free staked tokens. Caveat: There is a 10 day unstaking delay. So the exploiter would not be able to actually convert the staked tokens back into TONIC until the cooldown period had passed. What Cronos said: Thank you for reporting this issue. The team has verified that the exploit described can indeed work. From our side, we have safeguards in place to mitigate these risks; such as a 10 days delay period for the xTonic minted. As such, there is a low possibility of the exploit realising; as the issue will be rectified before the exploiter can launder the gotten funds. However, we do appreciate your effort in identifying this issue and plan to update the contract to eliminate the risk entirely. In addition, we are happy to reward you with USD1,600 as a token of appreciation. Actions: Cronos fixed the vulnerability immediately, before even responding to the report. My thoughts: Obvious lowball. Cronos's max bounty was $250,000 and they offered $1,600. I understand the technicality with this attack, and would have agreed to a payout less than the max, but the payout would have to accurately represent the value of this report. Mediation: Immunefi mediated twice and confirmed that this report deserved the max bounty. Immunefi told Cronos that a simple unstaking delay is not an adequate means of protection. Cronos claimed: "We have implemented a robust monitoring framework, consisting of internal systems, protocols, and strategic third-party partnerships, which promptly respond to any anomalies within our smart contracts. This is the standard of any big organization, and we refrain from disclosing further specifics to maintain the integrity of our security protocols." When Immunefi asked them to provide any information regarding their automated detection and mitigation processes, Cronos would not comply. Result: Cronos was kicked off Immunefi. Final thoughts from Django: 'Tis the life of a bug hunter.
English
42
63
383
91.9K
Tib3rius
Tib3rius@0xTib3rius·
Is there anything insecure about this code?
Tib3rius tweet media
English
103
14
346
159.6K
Katie Paxton-Fear
Katie Paxton-Fear@InsiderPhD·
this is what happens when you try and create content but you don't actually understand the topic you're writing about
Katie Paxton-Fear tweet media
English
16
82
599
123.5K
Dmitriy Shagov
Dmitriy Shagov@dmi3sh·
@0xTib3rius Thanks! You are right. I just checked the rfc and it says that empty signature is required for "alg": "none".
Dmitriy Shagov tweet media
English
0
0
1
524
Tib3rius
Tib3rius@0xTib3rius·
@dmi3sh The spec requires it, which means any implementation that matches the spec will reject it. In my experience that is most implementations. In any case, it should be mentioned. Removing the signature would still work with your code. Not removing it would lead to false negatives.
English
1
0
3
879
Tib3rius
Tib3rius@0xTib3rius·
Wish more people would stop sharing this guy's bug bounty tips, which more often than not contain simple errors. This one misses the important step of removing the signature. 🙄
Tib3rius tweet media
English
7
11
76
21.5K
Dmitriy Shagov
Dmitriy Shagov@dmi3sh·
@pmnh_ Imo, the best preparation for real-world bug hunting is real-world bug hunting. Read write-ups, look for bugs, try to repeat ideas, research, reiterate :)
English
2
0
12
599
Dmitriy Shagov
Dmitriy Shagov@dmi3sh·
@pmnh_ I have a controversial opinion about CTFs. Imo, CTF is bug hunting without bounties. So why do CTFs when there are rewardable bugs everywhere? Why focus on flags when there are identical real bugs?
English
5
0
8
1.4K
Peter M
Peter M@pmnh_·
BB community: what do you think best prepares someone for real-world bug hunting? Personally I am a huge fan of CTFs as I think they often require a lot of creative thinking and obscure knowledge which does help in real life.
English
9
3
21
19.3K
Dmitriy Shagov
Dmitriy Shagov@dmi3sh·
@nnwakelam Depends. I’d take into consideration timeframe and what is happening on the backend. For example, 1M requests bruteforcing static js files don’t look bad. But 1M requests to some dynamic stuff is too much imo.
English
0
1
0
693
Dmitriy Shagov retweetledi
Roman Buzko
Roman Buzko@roman_buzko·
Greetings, everyone! Happy to share that Degoverned.com is transitioning from an invite-only platform to a public alpha.
Roman Buzko tweet media
English
1
1
4
683
Dmitriy Shagov
Dmitriy Shagov@dmi3sh·
@BYCIOR @LiveOverflow For subdomain takeover - no cookies/CORS/phishing value (sub to some non-valuable domain). Logout CSRF. XSS on cdn or some meaningless (no cookies, no CORS etc) subdomain. You are right about future value. Issue with 0 impact today can become very serious if code/infra changes
English
0
0
1
51
lukaszb
lukaszb@bycior·
@dmi3sh @LiveOverflow How subdomain takeover or any other bug mentioned would have 0 direct impact? I do not get the logic behind this. In that case not following the best security practices would be considered not an vulnerability? Just treated like a note in the final security report?
English
2
0
0
57
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
Ready for my next security hot-take? "Is subdomain takeover always a vulnerability?" 🙈
English
8
1
31
22.5K