Project-Zero
874 subscribers
13 photos
5 files
306 links
Download Telegram
There are many places to fuzz in an HTTP request, but there’s one often-overlooked spot that’s actually very promising. Check out this URL:

redacted[.]com/index.php?mode=show&q=meydi

Most people focus on fuzzing parameters and paths — and yes, that’s always necessary. But one smart approach is value fuzzing, especially when changing a single value can significantly alter the response.

For example, take this:

redacted[.]com/index.php?mode=FUZZ&q=meydi

Here, fuzzing the mode parameter can lead to interesting behavior. It’s a great spot to test for hidden functionalities

📱Link
Please open Telegram to view this post
VIEW IN TELEGRAM
👍112
I was writing a "Security in JavaScript" book, that I explained how you can make an advance XSS payload like this one:

[...{[Symbol.iterator]:\u0061lert.bind(null,'catfather')}]‍‍‍


https://x.com/hoseinshurabi/status/1941905813041201247
111
Project-Zero
These vendors are making our job harder and harder https://x.com/garethheyes/status/1943258793883648450?s=46
توی نسخه جدید Firefox Nightly، یه تکنیک مخرب به اسم DOM Clobbering بگا رفت!

💡 قبل از این تغییر، اگه یه المنت HTML مثل
<img name="currentScript">
توی صفحه می‌ذاشتی، می‌تونست مقدار
 document.currentScript
رو خراب کنی یعنی مرورگر به جای اینکه به <script> واقعی اشاره کنه، اون img رو نشون می‌داد 😬

اما حالا:
دیگه نمی‌تونی با name یا id، ویژگی‌های داخلی document رو بازنویسی کنی (مثل document.currentScript, document.forms, document.location و غیره)


<img src=a name=currentScript>
<script>
alert(document.currentScript)
</script>
Please open Telegram to view this post
VIEW IN TELEGRAM
10😢3
Project-Zero
https://x.com/mehdiparandin/status/1943774358326985187?s=46
حل کردید یا مشکلی بود بهم بگید:
@meydi7
🔥3
Project-Zero
https://x.com/mehdiparandin/status/1943774358326985187?s=46
https://mey-d.github.io/posts/self-xss-disk-cache/

جواب چلنج امیدوارم خوشتون اومده باشه
🔥12🤩1