FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

PortSwigger Research

20 articles

PortSwigger Research General Oct 23

Concealing payloads in URL credentials

Last year Johan Carlsson discovered you could conceal payloads inside the credentials part of the URL .

T1598

PortSwigger Research →

PortSwigger Research General Sep 3

Introducing the URL validation bypass cheat sheet

URL validation bypasses are the root cause of numerous vulnerabilities including many instances of SSRF, CORS misconfiguration, and open redirection.

PortSwigger Research →

PortSwigger Research General Aug 8

Gotta cache 'em all: bending the rules of web cache exploitation

Through the years, we have seen many attacks exploiting web caches to hijack sensitive information or store malicious payloads.

T1598

PortSwigger Research →

PortSwigger Research General Aug 7

Splitting the email atom: exploiting parsers to bypass access controls

Some websites parse email addresses to extract the domain and infer which organisation the owner belongs to. This pattern makes email-address parser discrepa...

PortSwigger Research →

PortSwigger Research General Oracle Aug 7

Listen to the whispers: web timing attacks that actually work

Websites are riddled with timing oracles eager to divulge their innermost secrets. It's time we started listening to them.

PortSwigger Research →

PortSwigger Research General Apple Jul 9

Fickle PDFs: exploiting browser rendering discrepancies

Imagine the CEO of a random company receives an email containing a PDF invoice file. In Safari and MacOS Preview, the total price displayed is £399.

PortSwigger Research →

PortSwigger Research General Jul 2

A hacking hat-trick: previewing three PortSwigger Research publications coming to DEF CON & Black Hat USA

We're delighted to announce three major research releases from PortSwigger Research will be published at both Black Hat USA and DEF CON 32.

PortSwigger Research →

PortSwigger Research Vulnerability Disclosure Apple Jun 11

onwebkitplaybacktargetavailabilitychanged?! New exotic events in the XSS cheat sheet

The power of our XSS cheat sheet is we get fantastic contributions from the web security community and this update is no exception.

PortSwigger Research →

PortSwigger Research General May 29

Refining your HTTP perspective, with bambdas

When you open a HTTP request or response, what do you instinctively look for? Suspicious parameter names?

PortSwigger Research →

PortSwigger Research General May 22

Introducing SignSaboteur: forge signed web tokens with ease

Signed web tokens are widely used for stateless authentication and authorization throughout the web.

PortSwigger Research →

PortSwigger Research Vulnerability Disclosure Mar 19

Making desync attacks easy with TRACE

Have you ever found an HTTP desync vulnerability that seemed impossible to exploit due to its complicated constraints?

PortSwigger Research →

PortSwigger Research General Mar 5

Using form hijacking to bypass CSP

In this post we'll show you how to bypass CSP by using an often overlooked technique that can enable password theft in a seemingly secure configuration. What...

PortSwigger Research →

PortSwigger Research TTPs Feb 19

Top 10 web hacking techniques of 2023

Welcome to the Top 10 Web Hacking Techniques of 2023, the 17th edition of our annual community-powered effort to identify the most innovative must-read web s...

PortSwigger Research →

PortSwigger Research General Oracle Jan 23

Hiding payloads in Java source code strings

In this post we'll show you how Java handles unicode escapes in source code strings in a way you might find surprising - and how you can abuse them to concea...

PortSwigger Research →

PortSwigger Research TTPs Jan 9

Top 10 web hacking techniques of 2023 - nominations open

Update: The results are in!

PortSwigger Research →

PortSwigger Research General Dec 12

Finding that one weird endpoint, with Bambdas

Security research involves a lot of failure.

PortSwigger Research →

PortSwigger Research General Dec 5

Blind CSS Exfiltration: exfiltrate unknown web pages

This is a gif of the exfiltration process (We've increased the speed so you're not waiting around for 1 minute). Read on to discover how this works.

T1041

PortSwigger Research →

PortSwigger Research General Oct 18

The single-packet attack: making remote race-conditions 'local'

The single-packet attack is a new technique for triggering web race conditions.

PortSwigger Research →

PortSwigger Research General Oct 3

How to build custom scanners for web security research automation

In this post, I'll share my approach to developing custom automation to aid research into under-appreciated attack classes and (hopefully) push the boundarie...

PortSwigger Research →

PortSwigger Research General Apple Aug 9

Smashing the state machine: the true potential of web race conditions

For too long, web race condition attacks have focused on a tiny handful of scenarios.

PortSwigger Research →

« Prev 1 2
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA