ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು & ಪ್ರತಿಕ್ರಿಯೆಗಳು
- ಮಾಧ್ಯಮ
@slekies ತಡೆಹಿಡಿಯಲಾಗಿದೆ
ನೀವು ಖಚಿತವಾಗಿಯೂ ಈ ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡಲು ಬಯಸುವಿರಾ? ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡುವುದು @slekies ಅವರನ್ನು ತಡೆತೆರವುಗೊಳಿಸುವುದಿಲ್ಲ.
-
ಪಿನ್ ಮಾಡಿದ ಟ್ವೀಟ್
The full list of CSP bypasses with all known vectors that came up during the recent discussions: http://sebastian-lekies.de/csp/bypasses.php …
-
Advice to untangle cyber PR: If someone says "we got attacked X times" without exactly saying what "attack" means it's cyber-bullshit.
-
We keep hearing rumors that there'll be an ★Allstars 2017★ during OWASP AppSec EU in Belfast. Maybe there is something to it… cc
@AppSecEU -
There are still free seats for my workshop about Inkscape in Zurich
#inkange https://www.eventbrite.com/e/ange-albertini-binary-poster-workshop-tickets-29729953090 … Please RTpic.twitter.com/aOfc0rE8a9
-
How to write a research paper: a guide for software engineers & practitioners. https://docs.google.com/presentation/d/1LGcM3Jmd5ZkoYfn1Bph4W4-lYQD0lDnrtOKe3IpTiAs/edit?usp=sharing … /cc
@inwyrd -
Remove DOM nodes without JavaScript: <svg><animate id=a dur=1 /><circle r=100> <discard begin=a.end xlink:href=
#x /><style id=x>*{fill:red} -
5 more CSP bypasses added to the list: http://sebastian-lekies.de/csp/bypasses.php …
-
any additional ideas?
@0x6D6172696F@kkotowicz@garethheyes -
Framework-specific bypasses are also welcome!
-
Added a few more CSP bypasses to the list. Happy to receive suggestions, ideas and PoCs. Just ping me. http://sebastian-lekies.de/csp/bypasses.php …
-
CSP-protected HTML injections can probably be used to break same-site cookies to conduct CSRF. (cc
@sirdarckcat,@mikewest,@arturjanc) -
Are you ready for life outside the
#Angular sandbox@cigital@synopsyshttps://blogs.synopsys.com/software-integrity/2016/12/28/angularjs-1-6-0-sandbox/ … -
Slightly surprised by how many ways there are to mutate HTML without JS! https://sirdarckcat.github.io/csp/attlist.xml (by
@0x6D6172696F http://html5sec.org/#67 ) -
@sirdarckcat hah, my CSP nonce bypass: https://jsbin.com/vigodiqifo/ -
Another type of CSP nonce bypass. FF+Chrome. Works with traditional reflected XSS. http://sirdarckcat.github.io/csp/fakexss.html … Happy new year!
-
Sebastian Lekies ಹಿಂಬಾಲಿಸಿದ್ದಾರೆ Juan David Parra, Intent To Ship, Enrico Mrass and 4 others
-
@intenttoship
I tweet when browser makers announce their intent to ship, change or remove features in their web engines! I was made by
@dietrich.
ಲೋಡಿಂಗ್ ಸಮಯ ಸ್ವಲ್ಪ ತೆಗೆದುಕೊಳ್ಳುತ್ತಿರುವಂತೆನಿಸುತ್ತದೆ.
Twitter ಸಾಮರ್ಥ್ಯ ಮೀರಿರಬಹುದು ಅಥವಾ ಕ್ಷಣಿಕವಾದ ತೊಂದರೆಯನ್ನು ಅನುಭವಿಸುತ್ತಿರಬಹುದು. ಮತ್ತೆ ಪ್ರಯತ್ನಿಸಿ ಅಥವಾ ಹೆಚ್ಚಿನ ಮಾಹಿತಿಗೆ Twitter ಸ್ಥಿತಿಗೆ ಭೇಟಿ ನೀಡಿ.
Sebastian Lekies
hanno
Cure53
杏
Michael Eder
Adrienne Porter Felt
.mario
Lewis Ardern
Eduardo Vela
长短短