d4d
@zakfedotkin.bsky.social
660 followers
100 following
24 posts
Zak Fedotkin
All thought are mine and mine alone
Posts
Media
Videos
Starter Packs
Pinned
d4d
@zakfedotkin.bsky.social
· 26d
WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine
Many testers and tools give up the moment a protocol upgrade to WebSocket occurs, or only perform shallow analysis. This is a huge blind spot, leaving many bugs like Broken Access Controls, Race condi
portswigger.net
d4d
@zakfedotkin.bsky.social
· Sep 3
Cookie Chaos: How to bypass __Host and __Secure cookie prefixes
Browsers added cookie prefixes to protect your sessions and stop attackers from setting harmful cookies. In this post, you’ll see how to bypass cookie defenses using discrepancies in browser and serve
portswigger.net
d4d
@zakfedotkin.bsky.social
· Jul 25
d4d
@zakfedotkin.bsky.social
· May 28
Drag and Pwnd: Leverage ASCII characters to exploit VS Code
Control characters like SOH, STX, EOT and ETX were never meant to run your code - but in the world of modern terminal emulators, they sometimes do. In this post, I'll dive into the forgotten mechanics
portswigger.net
d4d
@zakfedotkin.bsky.social
· May 1
d4d
@zakfedotkin.bsky.social
· Apr 30
Drag and Pwnd: Leverage ASCII characters to exploit VS Code
Control characters like SOH, STX, EOT and EOT were never meant to run your code - but in the world of modern terminal emulators, they sometimes do. In this post, I'll dive into the forgotten mechanics
portswigger.net
Reposted by d4d
d4d
@zakfedotkin.bsky.social
· Jan 22
Stealing HttpOnly cookies with the cookie sandwich technique
In this post, I will introduce the "cookie sandwich" technique which lets you bypass the HttpOnly flag on certain servers. This research follows on from Bypassing WAFs with the phantom $Version cookie
portswigger.net
d4d
@zakfedotkin.bsky.social
· Dec 4