Matan Berson Profile Banner
Matan Berson Profile
Matan Berson

@MtnBer

Followers
2,928
Following
243
Media
6
Statuses
197

Hacking for fun | H1-65 Eliminator award | AWC23 Best New Hacker

Joined May 2020
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@MtnBer
Matan Berson
3 months
Just released my blog post "Bidding Like a Billionaire - Stealing NFTs With 4-Char CSTIs"! It's about a very impactful and technically interesting client-side bug I found in a major NFT site.
15
63
351
@MtnBer
Matan Berson
8 months
My Chrome bug just got disclosed! It’s a really cool chain of 4 vulns leading to local file read and universal XSS (including extensions). Maybe I’ll make a blog post about it
Tweet media one
22
100
698
@MtnBer
Matan Berson
5 months
Just wrote a ~2.5 page blog post on Client Side Path Traversal, covering what CSPT is, why it can be so impactful, some advanced exploitation and WAF bypass techniques, and a bug which I found in a live hacking event (redacted ofc)
8
108
372
@MtnBer
Matan Berson
5 months
Query selector calls in JS are interesting both as a sink, and because they're often used by interesting functionality (as discussed in last week's @ctbbpodcast episode), so I threw together a short config for the DomLogger++ extension to find them
Tweet media one
7
13
113
@MtnBer
Matan Berson
2 months
Continuing the @PortSwiggerRes streak, @garethheyes just gave a completely mindblowing talk about email addresses! I was completely stunned by some of the things he mentioned there. He also gave me a copy of his amazing book JavaScript for Hackers 😄
Tweet media one
0
5
113
@MtnBer
Matan Berson
2 months
Wow. @albinowax ’s web timing attacks talk was absolutely incredible. I’m speechless
4
3
81
@MtnBer
Matan Berson
4 months
This is super useful. I always forget which characters I can use where and have to set up a script to fuzz the HTML
@hackerscrolls
Hack3rScr0lls
4 years
Last time we showed you how to use encodings in <a>. Now we've made a scheme what symbols in which points you can inject to bypass WAF, filters, sanitizers. #BugBounty #CyberSecurity #BugBountyTip
Tweet media one
4
239
608
1
4
68
@MtnBer
Matan Berson
3 months
I’m always surprised about how many devs overlooks this. I have found pretty much this exact issue in the chrome devtools frontend. If you don’t know the answer to this then 1. You should go and read “JavaScript for Hackers” by @garethheyes 2. Put a \r, \n or \t in the scheme
@renniepak
renniepak
3 months
Mini XSS quiz. Easy mode, but often overlooked :)
Tweet media one
8
3
54
1
8
66
@MtnBer
Matan Berson
6 months
Had a blast in the #H165 event by @salesforce and @Hacker0x01 ! The location was amazing, the Salesforce team was super nice and helpful, and the hackers I met were incredibly talented. I also won the eliminator award for one of my bugs!
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
1
58
@MtnBer
Matan Berson
2 months
Just noticed the for the whole episode I did on the @ctbbpodcast I was talking through my camera’s mic and not through the good mic I bought specifically for that episode😭😭😭
7
0
55
@MtnBer
Matan Berson
10 months
Really proud of my performance, apparently I made ~9% of the total bounties. Shoutout to HackerOne and team Israel for an awesome event
@Hacker0x01
HackerOne
10 months
One word recaps the 2023 #AmbassadorWorldCup perfectly….EPIC! 🙌 12 countries represented, 799 valid submissions, and $1.7M in bounties paid! Check out the finale recap and learn how AWC partners are taking these findings back to their security teams.
Tweet media one
0
4
33
6
0
48
@MtnBer
Matan Berson
3 months
The preview for my latest blog post "Bidding Like a Billionaire - Stealing NFTs With 4-Char CSTIs" is out for the Critical Tinkers tier on the @ctbbpodcast discord👀 It's about a really sick bug so I can't wait to release it and share it with all of you
3
1
40
@MtnBer
Matan Berson
4 months
@xitsec Thanks! I definitely had a good couple of months 😅 What I look for is very target-specific, and I mainly just look at any feature that seems interesting to me. There almost isn’t anything that I consistently look for in every single target I hack on
3
0
37
@MtnBer
Matan Berson
4 months
These @hackerscrolls tips are so good
@hackerscrolls
Hack3rScr0lls
4 years
There is a popular opinion: bad CORS like <Access-Control-Allow-Origin: *> is unexploitable. Browser won't send cookies in this case. It is a delusion. You can exploit it with a Chrome cache feature! For example: #BugBountyTip #CyberSecurity #BugBounty
Tweet media one
4
333
754
2
3
37
@MtnBer
Matan Berson
4 months
This might be one of the best resource investments I've made, the exclusive perks and content are so good
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
4 months
Another top hacker joins the CTers! Thanks for the sub @MtnBer ❤️
Tweet media one
1
0
11
2
3
30
@MtnBer
Matan Berson
7 months
Instead of a blog post I’m making a video on my chrome bug together with the amazing @PwnFunction ! This will be awesome.
@PwnFunction
PwnFunction
7 months
@MtnBer cooks and I serve.
Tweet media one
2
0
31
0
0
29
@MtnBer
Matan Berson
3 months
I thought I knew pretty much all there is to know about CSPT and I couldn’t be happier to be proven wrong. I bet if you can pollute body params with query params in one endpoint you can probably do it everywhere, so because CSPT is usually systemic I bet you can wreck that target
@Rhynorater
Justin Gardner
3 months
CSPT is my favorite vuln type - and I yap about it on @ctbbpodcast all the time. I've been reporting CSPTs for the past 2 years+ now, so in light of the new research dropped by @Doyensec , let me drop a couple of takes on this🔥research:
1
64
256
0
2
25
@MtnBer
Matan Berson
1 year
Overrides in chrome are an even more underrated feature. Yesterday I learnt that on top of letting you modify sources, this feature also lets you modify the headers of responses! Plus, all of the overrides are stored in well structured dirs and can be easily shared and edited
@Rhynorater
Justin Gardner
1 year
One of the most underrated features in Caido/Burp is the Match&Replace feature. Here are a bunch of use cases for how to use match and replace to test effectively: 1. Turn on feature flags Most of the time, when testing large applications, there are features present in the
12
63
242
2
2
22
@MtnBer
Matan Berson
2 months
@Rhynorater @ctbbpodcast Thanks for having me on the pod! I had a blast recording that episode and it really is such a banger
1
0
19
@MtnBer
Matan Berson
4 months
Mobile hunters - how do your bugs usually get rated in terms of CVSS? More specifically: What are AC and UI usually set to in an attack that requires a malicious app to be installed? Are there any common scenarios where Scope is usually set to changed (like reflected XSS in web)?
4
0
18
@MtnBer
Matan Berson
5 months
If anyone has an open redirect/STO/XSS on *.vscode.dev hmu
2
0
16
@MtnBer
Matan Berson
4 months
Also, from now on I'll start posting previews of my latest blog posts in the critical-thinkers channel a few days before I release them. There's a good one coming up on some advanced client side template injection exploitation so stay tuned!
0
0
16
@MtnBer
Matan Berson
2 months
@ArchAngelDDay I used to test for SMTP injection which basically allows for this. It usually got accepted as medium, and one program even explicitly said “This is definitely an issue and a really cool find” so I guess most programs like it
0
0
13
@MtnBer
Matan Berson
3 months
Does anybody know a way to exploit document.head.innerHTML = location.href? Every payload I put in the query or the hash gets URL encoded
3
1
11
@MtnBer
Matan Berson
6 months
Special shoutout to @shm0ul , @ArchAngelDDay , @Michael1026H1 @ryotkak , and @kongwenbin , you all are awesome and I really look forward to hacking with you in the future!
1
0
11
@MtnBer
Matan Berson
7 months
@deryilz Thanks!! I really liked your blog on the chrome XSS issue you found (). I especially liked the trick with the “filesystem” scheme it���s very clever This morning someone asked me for article recommendations and I gave it to him
1
1
9
@MtnBer
Matan Berson
4 months
Always hungry for more gourmet research from @albinowax
@albinowax
James Kettle
5 months
I'm thrilled to announce "Listen to the whispers: web timing attacks that actually work" will premiere at Black Hat USA! After nine months of running bulk timing attacks on thousands of live sites, I've got a lot to share :D #BHUSA @BlackHatEvents
35
105
660
0
0
9
@MtnBer
Matan Berson
6 months
Definitely gonna switch to early adopter for that update
@c3l3si4n
celesian
6 months
Tweet media one
Tweet media two
13
16
293
0
0
7
@MtnBer
Matan Berson
9 months
Best episode yet imo, really worth a listen
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
9 months
Episode 52 is live and, to celebrate our one year anniversary, we put together a MEGA episode compiling the top technical content of 2023 into ONE episode. If you're gonna see any CT episode, check this one out!
3
19
91
0
2
7
@MtnBer
Matan Berson
2 months
@_godiego__ Like this article where ChatGPT wrote it from the perspective of the program “matanber reported this vulnerability through our HackerOne bug bounty program”
0
0
6
@MtnBer
Matan Berson
6 months
@joaxcar Congrats! I’m really glad to see the success you’re having hacking full-time. And btw, the stats that you share are very motivating so thanks for that!
1
0
6
@MtnBer
Matan Berson
1 year
You know that CSS encoding magic trick that @ctbbpodcast mentioned once (\20 = “ “ etc.)? Well today I found it works in JQuery and document.querySelectorAll too. My spaces were getting URL encoded so it really saved me
0
1
6
@MtnBer
Matan Berson
4 months
@lalit80842 @xitsec It’s not a generic bug type, just a very target-specific JS bug. If they will let me then I’ll write a blog post about it at some point
1
0
6
@MtnBer
Matan Berson
1 month
@gregxsunday Love the thumbnail 😂 thanks for having me
1
0
6
@MtnBer
Matan Berson
6 months
0
0
5
@MtnBer
Matan Berson
7 months
@PwnFunction It’s gonna be 🔥
0
0
5
@MtnBer
Matan Berson
1 month
@schniggie I didn’t discover that technique but yeah it’s pretty useful
1
0
4
@MtnBer
Matan Berson
8 months
@Rhynorater Thanks man!
1
0
4
@MtnBer
Matan Berson
2 months
1
0
3
@MtnBer
Matan Berson
5 months
@kevin_mizu @ctbbpodcast Nice! I really like this extension, I’ve found some bugs with it that I wouldn’t have found otherwise
1
0
4
@MtnBer
Matan Berson
2 months
@ryancbarnett Thanks for the kind words man! I’m glad you enjoyed the episode
0
0
4
@MtnBer
Matan Berson
3 months
@sw33tLie @0xteknogeek this could probably be useful next time you need to fuzz a non-titlecase x-forwarded-for
0
0
4
@MtnBer
Matan Berson
3 months
1
0
3
@MtnBer
Matan Berson
4 months
‼️This technique is probably fixed nowadays. Thanks for noticing that @Rhynorater
0
0
3
@MtnBer
Matan Berson
1 month
@joaxcar I know that in chrome \n and \r work inside of fetch too, idk about \t
1
0
4
@MtnBer
Matan Berson
6 months
@joaxcar You should to a certain extent because even in programs that solely use CVSS, I think you have a better chance of getting a good score if the team feels that the attack is more realistic
1
0
3
@MtnBer
Matan Berson
1 month
@gregxsunday @joaxcar - A situation where the client does something like GET /asdf/[malicious input], and the server tries to prevent the malicious input from being “..”, which would cause a request to /asdf. This situation would require parsing but it’s super rare and I’ve never actually seen it
1
0
3
@MtnBer
Matan Berson
1 month
@gregxsunday @joaxcar Usually when you try to prevent CSPT you just URL-encode any slashes in the input so there’s no parsing envolved there. The only situations where I can see this being used to bypass a server-side parser is: - WAF bypass, which is already pretty easy
1
0
3
@MtnBer
Matan Berson
2 months
@liran_tal @PikuHaku @LiveOverflow The subdomain in app A has a token that allows it to interact with some API. The XSS leaks it and is able to interact with the API. The subdomain in app B interacts with the API using cookies. The XSS is also able to interact with the API here and leak/modify the same data.
0
0
3
@MtnBer
Matan Berson
4 months
@itz_mg_ Congrats!!
1
0
3
@MtnBer
Matan Berson
5 months
@Rhynorater Took me like 5 minutes of work😅 glad you like it though
0
0
3
@MtnBer
Matan Berson
3 months
@zseano @galnagli @scarybeasts Maybe making that leaderboard opt-out could solve that?
0
0
3
@MtnBer
Matan Berson
4 months
@AbhinabTweets @ynsmroztas @ctbbpodcast Postmessage logger, DomLogger++, and Wappalyzer
1
0
3
@MtnBer
Matan Berson
11 months
@djurado9 Thanks man😂 You guys were incredible
1
0
3
@MtnBer
Matan Berson
1 year
@joaxcar If you can’t do anything more interesting like what @gregxsunday mentioned, then you can inject CSS with the “Link” header
0
0
3
@MtnBer
Matan Berson
2 months
@aszx87410 Thanks for making it! It’s a great resource
0
0
3
@MtnBer
Matan Berson
3 months
@NinjaRooker Thanks! The most important language to learn for web client side bugs is definitely javascript. Some good resources for learning js or learning about js are MDN and "JavaScript for Hackers" by Gareth Heyes
1
0
3
@MtnBer
Matan Berson
2 months
@joaxcar Oh yeah now I remember I saw that sometime. Too bad there isn’t a “combined” section
1
0
2
@MtnBer
Matan Berson
5 months
@kevin_mizu Thanks for all the hard work!
0
0
2
@MtnBer
Matan Berson
1 year
@Rhynorater These info nuggets on browser behavior are always useful and the episode specifically about them is one of my favorites. Thanks!
1
0
2
@MtnBer
Matan Berson
3 months
@NahamSec Congrats Ben!!
0
0
2
@MtnBer
Matan Berson
3 months
@WeizmanGal @AbhinabTweets @ynsmroztas @ctbbpodcast So I’ve checked and the snaps feature is in scope for the bbp, but I don’t see LavaDome mentioned anywhere. Do you think submissions for it would get accepted? If not then I can still test it a bit but I won’t sink too much time into it
1
0
2
@MtnBer
Matan Berson
7 months
@JonathanBouman @VvAA Damn. Great work!
0
0
2
@MtnBer
Matan Berson
2 months
@liran_tal @PikuHaku @LiveOverflow Can you clarify what you're trying to say with point 3? Isn't this whole discussion about what the impact of a successful XSS attack (that isn't blocked by a WAF) would be for a site that stores tokens in localStorage vs one that doesn't
2
0
2
@MtnBer
Matan Berson
5 months
@alexbindrei @salesforce Thank you so much for the kind words!❤️
0
0
2
@MtnBer
Matan Berson
1 year
Here's a prototype of a cool idea I had: the "Rainbow Phishbar". It hashes the origin of a URL (protocol+domain+port) and sets the color of the lock icon according to that hash, to make phishing URLs look visually different. You can find this demo at matanber[.]com/phishbar
Tweet media one
0
0
2
@MtnBer
Matan Berson
3 months
@archyxsec No I haven’t, bugs that only effect IE aren’t very interesting
1
0
2
@MtnBer
Matan Berson
4 months
@ryancbarnett @garethheyes @hackerscrolls Just registered for the site and it looks great! Creating a dynamic visual like the one you described would definitely make the fuzzing results easier to understand
1
0
2
@MtnBer
Matan Berson
1 year
@hakluke This is a great tip! I’ve been using xc as an alias for xclip for years now and it’s super useful. I also use “xco” to output the clipboard to stdout (xclip -selection clipboard -out)
0
0
2
@MtnBer
Matan Berson
1 month
@itz_mg_ Nice, see you there!
1
0
2
@MtnBer
Matan Berson
2 months
0
0
2
@MtnBer
Matan Berson
6 months
@PikuHaku @joaxcar Yeah, and it does make sense imo because if the attack requires way too much interaction then the attacker wouldn’t be able to perform it consistently
0
0
2
@MtnBer
Matan Berson
4 months
@nmatt0 Congrats and thanks for the awesome content!
0
0
2
@MtnBer
Matan Berson
3 months
@WeizmanGal @AbhinabTweets @ynsmroztas @ctbbpodcast What are some good use cases for it? Only thing I could come up with so far is querying a certain "cluster" of functions/classes like this and seeing the relationships between the results
1
0
2
@MtnBer
Matan Berson
5 months
@bishal0x01 @_godiego__ Yeah it is, thanks
1
0
2
@MtnBer
Matan Berson
2 months
@critbugchungus @ctbbpodcast Thanks! I appreciate the kind feedback
0
0
2
@MtnBer
Matan Berson
2 months
@liran_tal @PikuHaku @LiveOverflow In that scenario, if the architecture is implemented correctly I'd argue the XSS has the same impact in both apps.
1
0
2
@MtnBer
Matan Berson
3 months
@NinjaRooker @ctbbpodcast It’s exclusive to the Critical Thinkers tier of subscribers, so it’s in the “critical-thinkers” channel. I’m not affiliated with the podcast or anything but I really like it so I’m trying to help them get some more subscribers.
0
0
2
@MtnBer
Matan Berson
6 months
@caitlinnallison Nag I’m just kidding a lizard was walking on the sign so it looked like one of the ingredients
1
0
2
@MtnBer
Matan Berson
2 months
@joaxcar I’m pretty sure it does, you should probably still check that though just to make sure
0
0
2
@MtnBer
Matan Berson
2 months
@joaxcar Nice! Glad to hear that
1
0
1
@MtnBer
Matan Berson
3 months
@WeizmanGal @AbhinabTweets @ynsmroztas @ctbbpodcast Very interesting, I might start messing around with that snaps feature and try to use prototree to see if you missed anything
1
0
1
@MtnBer
Matan Berson
2 months
@PikuHaku @albinowax No it was all about backend stuff
0
0
1
@MtnBer
Matan Berson
6 months
@proabiral @galnagli @Bugcrowd Why would a VDP be private? Doesn’t that defeat the whole purpose of it😂
0
0
1
@MtnBer
Matan Berson
1 year
@samwcyo @infosec_au @iangcarroll These writeups are always so great. I still often quote from the threat model section of your web3 writeup in my reports. It’s super fun to see you hack nearly all forms of traversal known to man and I’m looking forward to a writeup on nuclear submarines
0
0
1
@MtnBer
Matan Berson
2 months
0
0
1
@MtnBer
Matan Berson
1 year
@ctbbpodcast I learnt this technique some time ago from tinyxss by @terjanq , It’s really useful resource. Here’s the short version I saw there: import(/\example[.]com/) Thanks terjanq!
0
0
1
@MtnBer
Matan Berson
5 months
@dPhoeniixx Very interesting, thanks for sharing!
0
0
1
@MtnBer
Matan Berson
5 months
1
0
1
@MtnBer
Matan Berson
5 months
@_godiego__ Where is that? Bugcrowd?
1
0
1
@MtnBer
Matan Berson
2 months
@AliaSaleh89 I’d say it’s a medium and I don’t think you can chain it with any other bug
1
0
1
@MtnBer
Matan Berson
1 month
@G0LDEN_infosec Aww thanks man! I’m glad you enjoyed it
0
0
1
@MtnBer
Matan Berson
1 year
@securibee I don’t like how brave makes a lot of noise in devtools. I will probably use some degoogled version of chromium if it helps mitigate this
0
0
1
@MtnBer
Matan Berson
1 year
@_CryptoCat Intercept response -> insert XSS payload -> report self-XSS
0
0
1
@MtnBer
Matan Berson
1 year
@Silou_Atien @LiveOverflow @Burp_Suite Good idea! I think you can do: ./chrome-renamed —custom-arg=value “$@“ in the script to keep the parameters added by burp. You can also just make a python script and “forward” argv[1:], which is how I do it in my scripts
0
0
1