Robuta

https://portswigger.net/research/splitting-the-email-atom Splitting the email atom: exploiting parsers to bypass access controls | PortSwigger Research Some websites parse email addresses to extract the domain and infer which organisation the owner belongs to. This pattern makes email-address parser... access controlssplittingemail https://portswigger.net/research/smashing-the-state-machine Smashing the state machine: the true potential of web race conditions | PortSwigger Research For too long, web race condition attacks have focused on a tiny handful of scenarios. Their true potential has been masked thanks to tricky workflows, missing... true potentialsmashingstate https://portswigger.net/research/how-i-choose-a-security-research-topic How I choose a security research topic | PortSwigger Research security researchchoosetopic https://portswigger.net/research/a-hacking-hat-trick-previewing-three-portswigger-research-publications-coming-to-def-con-amp-black-hat-usa A hacking hat-trick: previewing three PortSwigger Research publications coming to DEF CON & Black... hat trickportswigger research https://portswigger.net/research/finding-that-one-weird-endpoint-with-bambdas Finding that one weird endpoint, with Bambdas | PortSwigger Research one weirdbambdas portswigger Sponsored https://spicierai.com/ SPICIER AI https://portswigger.net/research/top-10-web-hacking-techniques-of-2020 Top 10 web hacking techniques of 2020 | PortSwigger Research Welcome to the Top 10 (novel) Web Hacking Techniques of 2020, our annual community-powered effort to identify the must-read web security research released in... hacking techniquestopweb https://portswigger.net/research/when-security-features-collide When security features collide | PortSwigger Research security featurescollide https://portswigger.net/research/practical-web-cache-poisoning Practical Web Cache Poisoning | PortSwigger Research cache poisoning portswigger https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher So you want to be a web security researcher? | PortSwigger Research web securitywantresearcher https://portswigger.net/research/cracking-recaptcha-turbo-intruder-style Cracking reCAPTCHA, Turbo Intruder style | PortSwigger Research turbo intrudercrackingstyle https://portswigger.net/research/breaking-the-chains-on-http-request-smuggler Breaking the chains on HTTP Request Smuggler | PortSwigger Research http requestbreakingchains https://portswigger.net/research/backslash-powered-scanning-hunting-unknown-vulnerability-classes Backslash Powered Scanning: hunting unknown vulnerability classes | PortSwigger Research Abstract Existing web scanners search for server-side injection vulnerabilities by throwing a canned list of technology-specific payloads at a target and... portswigger researchbackslash https://portswigger.net/research/cracking-the-lens-targeting-https-hidden-attack-surface Cracking the lens: targeting HTTP's hidden attack-surface | PortSwigger Research Modern websites are browsed through a lens of transparent systems built to enhance performance, extract analytics and supply numerous additional services. This... attack surfacecrackinglens https://portswigger.net/research/websocket-turbo-intruder-unearthing-the-websocket-goldmine WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine | PortSwigger Research Many testers and tools give up the moment a protocol upgrade to WebSocket occurs, or only perform shallow analysis. This is a huge blind spot, leaving many... turbo intruderwebsocket https://portswigger.net/research/how-to-build-custom-scanners-for-web-security-research-automation How to build custom scanners for web security research automation | PortSwigger Research build customweb security https://portswigger.net/research/top-10-web-hacking-techniques-of-2023 Top 10 web hacking techniques of 2023 | PortSwigger Research Welcome to the Top 10 Web Hacking Techniques of 2023, the 17th edition of our annual community-powered effort to identify the most innovative must-read web... hacking techniquestopweb https://portswigger.net/research/browser-powered-desync-attacks Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling | PortSwigger Research The recent rise of HTTP Request Smuggling has seen a flood of critical findings enabling near-complete compromise of numerous major websites. However, the... browser powereddesync attacks https://portswigger.net/research/gotta-cache-em-all Gotta cache 'em all: bending the rules of web cache exploitation | PortSwigger Research Through the years, we have seen many attacks exploiting web caches to hijack sensitive information or store malicious payloads. However, as CDNs became more... gottacacheembendingrules https://portswigger.net/research/top-10-web-hacking-techniques-of-2019 Top 10 web hacking techniques of 2019 | PortSwigger Research hacking techniquestopweb