توييتها
- توييتها
- توییت ها و پاسخ ها
- رسانه تصویری
@slekies مسدود شده
مطمئنید که میخواهید این توییتها را ببینید؟ دیدن توییتها @slekies را از مسدودیت در نمیآورد.
-
توییت سنجاقشده
The full list of CSP bypasses with all known vectors that came up during the recent discussions: http://sebastian-lekies.de/csp/bypasses.php …
-
Advice to untangle cyber PR: If someone says "we got attacked X times" without exactly saying what "attack" means it's cyber-bullshit.
-
We keep hearing rumors that there'll be an ★Allstars 2017★ during OWASP AppSec EU in Belfast. Maybe there is something to it… cc
@AppSecEU -
There are still free seats for my workshop about Inkscape in Zurich
#inkange https://www.eventbrite.com/e/ange-albertini-binary-poster-workshop-tickets-29729953090 … Please RTpic.twitter.com/aOfc0rE8a9
-
How to write a research paper: a guide for software engineers & practitioners. https://docs.google.com/presentation/d/1LGcM3Jmd5ZkoYfn1Bph4W4-lYQD0lDnrtOKe3IpTiAs/edit?usp=sharing … /cc
@inwyrd -
Remove DOM nodes without JavaScript: <svg><animate id=a dur=1 /><circle r=100> <discard begin=a.end xlink:href=
#x /><style id=x>*{fill:red} -
5 more CSP bypasses added to the list: http://sebastian-lekies.de/csp/bypasses.php …
-
any additional ideas?
@0x6D6172696F@kkotowicz@garethheyes -
Framework-specific bypasses are also welcome!
-
Added a few more CSP bypasses to the list. Happy to receive suggestions, ideas and PoCs. Just ping me. http://sebastian-lekies.de/csp/bypasses.php …
-
CSP-protected HTML injections can probably be used to break same-site cookies to conduct CSRF. (cc
@sirdarckcat,@mikewest,@arturjanc) -
Are you ready for life outside the
#Angular sandbox@cigital@synopsyshttps://blogs.synopsys.com/software-integrity/2016/12/28/angularjs-1-6-0-sandbox/ … -
Slightly surprised by how many ways there are to mutate HTML without JS! https://sirdarckcat.github.io/csp/attlist.xml (by
@0x6D6172696F http://html5sec.org/#67 ) -
@sirdarckcat hah, my CSP nonce bypass: https://jsbin.com/vigodiqifo/ -
Another type of CSP nonce bypass. FF+Chrome. Works with traditional reflected XSS. http://sirdarckcat.github.io/csp/fakexss.html … Happy new year!
-
Sebastian Lekies دنبال کرد Juan David Parra, Intent To Ship, Enrico Mrass and 4 others
-
@intenttoship
I tweet when browser makers announce their intent to ship, change or remove features in their web engines! I was made by
@dietrich.
بهنظر میرسد بارگزاری صفحه طول کشیده است.
ممکن است ظرفیت توییتر پر باشد یا موقتاً دچار مشکلی شده باشد. دوباره امتحان کنید یا برای اطلاعات بیشتر از وضعیت توییتر بازدید کنید.
Sebastian Lekies
hanno
Cure53
杏
Michael Eder
Adrienne Porter Felt
.mario
Lewis Ardern
Eduardo Vela
长短短