Michał Bentkowski

@SecurityMB

Penetration testing, bounty hunting

Poland
Vrijeme pridruživanja: rujan 2014.

Medijski sadržaj

  1. 2. velj

    So yesterday I got married! Paula is the greatest woman I’ve ever met in my life and I can’t even express how happy and grateful I am that she’s going to be with me for the rest of my life. Thank you very much and I’m sure that we’ll have a happy life together!

  2. 23. sij
    Odgovor korisniku/ci

    This is perhaps my favourite quirk from HTML spec which is, in fact, mentioned directly in the spec:

  3. 8. sij

    This bug, fixed in latest Firefox, led to pretty interesting research, how you can exfiltrate data in Firefox with a single injection point (ie. no reloading iframes). I’m going to publish the trick soon.

  4. 8. sij

    New year, new profile pic ;)

  5. 2. pro 2019.

    [PL] 14 grudnia na konferencji opowiem o błędzie w AMP4Email i jak z niego urodziło się kilka kolejnych błędów (obejście DOMPurify czy CSP). Zapraszam!

  6. 13. lis 2019.

    If you’re going to be in Wrocław this Wednesday, consider going to ⁦⁩ Day, where I’m having a presentation about prototype pollution in Kibana. Here’s a little spoiler

  7. 22. ruj 2019.

    Just updated the XSS challenge () and added sandbox attribute to <iframe> so you cannot do this: :D

  8. 17. kol 2019.

    If CSP policy points to a dir and you use %2f to encode "/", it is still considered to be inside the dir. All browsers seem to agree on that. This leads to a possible bypass, by using "%2f..%2f" if server decodes it, example:

    Prikaži ovu nit
  9. 20. srp 2019.

    I don’t usually post my private stuff on Twitter but today my girlfriend and I, we got engaged and I just want to share my happiness with the world!

    Prikaži ovu nit
  10. 3. lip 2019.

    Today at 14:30 I’m having a presentation at community track about <portal> including an interesting bug in Chrome allowing to bypass SOP. Just go outside and join me if you’re interested!

  11. 13. svi 2019.

    Interesting. Thanks for the new <portal> element of Google () you can navigate to top-level data: URI again!

  12. 13. stu 2018.

    This is actually a great performance of a 19th century song called "Hello! Ma Baby" in Red Dead Redemption 2

  13. 2. stu 2018.

    What is this? "Origin Policy Error Interstitial"; getting this in Chrome Canary right now. CC:

  14. 22. srp 2018.

    I'm planning on releasing a write-up of a nice bug in Google Hangouts Chat (the desktop app) tomorrow. Here's a teaser (or spoiler actually).

  15. 24. stu 2017.

    I've just accidentally found my screencast of various XSS-es found in the Google Translator Toolkit back in 2015. Pretty neat; it's raining XSS-es ;)

  16. 29. kol 2017.
    Odgovor korisniku/ci

    Quite funnily, in JS console it executes immediately when you type the code but won't execute again after pressing Enter.

  17. 28. kol 2017.

    Currently working on revisiting the CSS scrollbar attack. Write-up incoming ;-)

  18. 8. srp 2017.
    Odgovor korisnicima

    Oh, and I think I found a bypass: just use duplicate attributes name. CC:

  19. 7. srp 2017.

    The code doesn't execute on Chrome59 while it does on Canary. Anyone knows why? Some kind of builtin protection against this kind of attack?

  20. 1. ruj 2016.
    Odgovor korisniku/ci

    It seems that url.searchParams is to blame.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·