Ruben V Piña
banner
nzt-48.org
Ruben V Piña
@nzt-48.org
form-action Content Security Policy Bypass

This bypass can help you turn those unexploitable XSS bugs into exploitable vulnerabilities.

nzt-48.org/form-action-...
January 30, 2025 at 6:20 AM
form-action Content Security Policy bypass

This post might help you turn those unexploitable XSS bugs into exploitable vulnerabilities

nzt-48.org/form-action-...
January 29, 2025 at 5:05 AM
Tool that searches for a specific string in the Import and Export tables of all the Windows binaries located in a given directory.

It is a very practical and convenient way to find which binaries make use of a function you know how to exploit.

nzt-48.org/tool-for-sca...
January 22, 2025 at 6:00 AM
LoginCrack .py

Post about methods to break web logins

If you are not using these attack vectors against web logins, you are not doing it right.

nzt-48.org/new-tool-for...
January 22, 2025 at 5:56 AM
Paper about extremely fast blind SQL injection techniques.

It uses a decision-making algorithm that extracts only some fragments of the information and deduces the rest (works 100% of the time)

Time to extract 10 MD5 hashes:
sqlmap: 5 seconds
lightspeed: 1 second

nzt-48.org/new-sql-inje...
January 22, 2025 at 5:37 AM
XSS vector that works in 21 different contexts.

Very useful to detect Blind XSS Vulnerabilities:

javascript:/*</title></textarea></style --></xmp></script></noembed></noscript></math><svg/onload='//"/**/%0aonmouseover=alert()//'>

Excerpt from www.nzt-48.org/xss-detection-optimization
January 22, 2025 at 3:39 AM
New paper about modern XPath exploitation. Versions 2.0 and 3.1 introduced new risks that expanded the attack surface. New tool released.

nzt-48.org/modern-xpath...
January 22, 2025 at 3:33 AM
these 3 vectors are always used to probe for SQL injection:
-1' OR '1'='1
-1" OR "1"="1
-1 OR 1=0

How about fusing them?
-1 OR 1#'OR"OR'"!='!=

Original idea by x.com/LightOS
Excerpt from nzt-48.org/sql-injectio...
January 20, 2025 at 8:40 PM
Reposted by Ruben V Piña
In case you missed it...the DEF CON video of my talk 'Splitting the Email Atom' is finally here! 🚀 Watch me demonstrate how to turn an email address into RCE on Joomla, bypass Zero Trust defences, and exploit parser discrepancies for misrouted emails. Don’t miss it:

youtu.be/JERBqoTllaE?...
DEF CON 32 - Splitting the email atom exploiting parsers to bypass access controls - Gareth Heyes
YouTube video by DEFCONConference
youtu.be
November 22, 2024 at 7:27 AM
Hello Blue Sky! We're now reaching maximum height.

You can find my research at nzt-48.org
January 11, 2025 at 10:24 PM