Kévin - Mizu Profile Banner
Kévin - Mizu Profile
Kévin - Mizu

@kevin_mizu

Followers
3,168
Following
670
Media
35
Statuses
734

Vulnerability researcher 🐛 | CTF with @HexagonCTF , @rhackgondins 🦦 | Team FR 2023 🇫🇷 |

Joined May 2017
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@kevin_mizu
Kévin - Mizu
9 months
Excited to launch my first browser extension, DOMLogger++! Now available for both Firefox and Chromium! 🎉 DOMLogger++ allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations 🔥 Check it out 👇 1/5
8
96
289
@kevin_mizu
Kévin - Mizu
1 year
I'm glad to finally present my research about "Abusing Client-Side Desync on Werkzeug" at @sstic 2023 📜 Research paper is available here: Slides are available here:
Tweet media one
12
145
461
@kevin_mizu
Kévin - Mizu
1 year
My vulnerability reports on are now available! ⚠️ If you use the desktop version, think about updating it! More information bellow 👇 - RCE: - XSS to RCE: - XSS:
13
95
333
@kevin_mizu
Kévin - Mizu
1 year
Last month, I did some research on NodeJS templating libraries. During this research, I found an interesting Server Side Prototype Pollution gadget inside EJS library that can be leveraged to RCE! Technical details here:
6
68
230
@kevin_mizu
Kévin - Mizu
8 months
For the @GrehackConf 2023 #CTF , I made 2 hard #web challenges 🚩 They were about: [1] Python class pollution to RCE on Flask application [2] HTTPOnly cookie leak due to Werkzeug improper Cookie parsing Detailed writeups 👇 [1] [2]
1
62
218
@kevin_mizu
Kévin - Mizu
2 years
Il y a quelques semaines, j'ai trouvé une vulnérabilité sur qui me permettait notamment de Rick Roll tous les utilisateurs accédant au site 👀 Vous pouvez retrouver le writeups sur mon site :
9
44
190
@kevin_mizu
Kévin - Mizu
2 months
DOMLogger++ v1.0.4 is now out and available in stores! It comes with new features that allow you, for example, to easily dig into DOM gadget occurrences after an innerHTML sink 🔥 More details can be found here 👇 1/3
Tweet media one
2
41
192
@kevin_mizu
Kévin - Mizu
1 year
Recently, I've started to search for full chains XSS to RCE on desktop application. With this objective in mind, I came up with an interesting concept of CSP script-src self bypass for local electron apps on Linux! ⏭️ Link below 👇
1
69
186
@kevin_mizu
Kévin - Mizu
2 months
I've finally finished my writeups for #FCSC2024 , which covered: - Nginx X-Accel-Redirect file read - Werkzeug error-based request smuggling - HTTP/1.1 and HTTP/0.9 browser confusion - Connection: close bypass via Expect: 100-continue - ... Link 👇 1/2
2
36
182
@kevin_mizu
Kévin - Mizu
5 months
Recently, I discovered a DOMPurify bypass in the case of CUSTOM_ELEMENT_HANDLING and FORBID_CONTENT options usage ⏭️ This issue isn't a big deal as it doesn't involve a default configuration bypass. However, I thought it was interesting to document it 👇
5
45
163
@kevin_mizu
Kévin - Mizu
7 months
I think it's time for a solution ⏰ To solve this challenge, you had to abuse the DOMPurify namespace misconfiguration to trigger an XSS this way 👇 Solution link: 1/6
Tweet media one
@kevin_mizu
Kévin - Mizu
7 months
Small XSS Challenge Time 🚩 Rules 📜 - You should only use the provided endpoint. - The solution must not involve user interaction. If you find the solution, please do not send it in the comments; send me a DM instead 📩 Challenge link 👇
Tweet media one
4
20
144
4
38
163
@kevin_mizu
Kévin - Mizu
7 months
Small XSS Challenge Time 🚩 Rules 📜 - You should only use the provided endpoint. - The solution must not involve user interaction. If you find the solution, please do not send it in the comments; send me a DM instead 📩 Challenge link 👇
Tweet media one
4
20
144
@kevin_mizu
Kévin - Mizu
2 months
Small Challenge Time 🚩 Rules 📜 - You should display an alert containing the flag cookie :) If you find the solution, please do not send it in the comments; send me a DM instead 📩 Challenge link and sources👇 - -
Tweet media one
3
22
113
@kevin_mizu
Kévin - Mizu
10 months
I wasn't knowing what to do yesterday night so, I decided to create an XSS challenge 🚩 There is nothing to win, I made it just for fun! If you want to try it out, click on the link below 👇 The final goal it to pop an alert without any interaction 🔥
Tweet media one
5
22
100
@kevin_mizu
Kévin - Mizu
7 months
In September, I looked into mlflow, and found several critical vulnerabilities 😁 Most of these reports are now patched and publicly available here: My favorite one involves a fully controlled file write via a custom rogue FTP 👇
6
19
98
@kevin_mizu
Kévin - Mizu
2 years
Yesterday, I did a talk on @rootme_org about #electron security. In this talk I also presented a step-by-step writeup of the research leading to finding the XSS to RCE vulnerability on @drawio last summer (CVE-2022-3133) ☀️ You can find the slides here:
2
38
97
@kevin_mizu
Kévin - Mizu
1 year
I'm really proud to be part of the team, thanks @ANSSI_FR for trusting me 🇫🇷 I will give my best for the @openECSC in october 🔥
@ANSSI_FR
ANSSI
1 year
[ #ECSC ] La Team France est au complet ! 👏 Découvrez la sélection des joueurs qui défendront les couleurs de la 🇫🇷 du 24 au 27 octobre 2023 à Hamar, en Norvège ! @Cybersec_EU @enisa_eu #UE #CTF #ECSC #ECSC2023 #TeamFR
Tweet media one
3
30
113
9
3
95
@kevin_mizu
Kévin - Mizu
2 months
Really proud of those bypass/mXSS variations. They involve some cool second-order DOM Clobbering and a new mutation gadget that I would like to call the elevator x) 1/2
@cure53berlin
Cure53
2 months
DOMPurify 2.5.3 and 3.1.3 were released, covering a range of attack variations relating to nesting-based mXSS. Thanks again to @kevin_mizu & @ryotkak for the invaluable help with finding new variations & verifying latest fixes 🙇
1
22
119
5
14
93
@kevin_mizu
Kévin - Mizu
2 months
I think it's time for a solution ⏰ TL;DR - Eventlet normalizes - to _ in header keys. - The Fetch spec blocks Transfer-Encoding but not Transfer_Encoding. - Bypass tracking policy on Firefox using open(). Detailed writeup 👇 1/2
@kevin_mizu
Kévin - Mizu
2 months
Small Challenge Time 🚩 Rules 📜 - You should display an alert containing the flag cookie :) If you find the solution, please do not send it in the comments; send me a DM instead 📩 Challenge link and sources👇 - -
Tweet media one
3
22
113
2
25
92
@kevin_mizu
Kévin - Mizu
2 months
👀
@cure53berlin
Cure53
2 months
As expected, two variations of the so far known mXSS attacks have been spotted and new DOMPurify releases are ready to fix those. Many thanks to @kevin_mizu and @hash_kitten for spotting and reporting those 🙇
2
30
157
4
3
84
@kevin_mizu
Kévin - Mizu
5 months
Challenge time is now over ⏰ TL;DR - HTML injection - Axios DOM Based CSPP - Axios CSPP response overwrite gadget - jQuery DOM Clobbering + CSPP selector overwrite gadgets - Setting src attr to "javascript:" for each HTML node ➝ XSS Detailed writeup 👇
@kevin_mizu
Kévin - Mizu
6 months
GG to all the solvers! However, no one solved it in the intended way :p Before giving my solution, I'm extending the challenge for another week with a fixed version! If you find the solution, please send me a DM 📮 The challenge is accessible here 👇
2
7
44
0
13
79
@kevin_mizu
Kévin - Mizu
1 year
I'm glad to announce that I will present a talk at @sstic #2023 about an interesting Client-Side Desync case I found past year in Werkzeug that can be leveraged to XSS on default configurations 🔥 More information here:
0
25
81
@kevin_mizu
Kévin - Mizu
8 months
Challenge time is now over, I hope you've liked it! 😁 TL;DR - mXSS via client-side / server-side confusion - auto download to store the payload on file:// - puppeteer bot without SOP ➝ devtools (CDP) - open file:// ➝ leak the flag Detailed writeup 👇
@intigriti
Intigriti
8 months
📚 Can't get enough of this challenge? Here's the official writeup by @kevin_mizu 💜
1
2
9
0
23
79
@kevin_mizu
Kévin - Mizu
1 year
#FCSC2023 is over! I ended 1st in the web category and 10th senior 🎉 Like every year, the CTF was incredible and I learned a lot of new stuff! Special thanks to @BitK_ for the hardest web challenges 🔥 My writeups can be found here:
Tweet media one
Tweet media two
2
12
77
@kevin_mizu
Kévin - Mizu
2 months
This is why I probably should stop reporting issues to the Werkzeug repository…
Tweet media one
@kevin_mizu
Kévin - Mizu
2 months
I've finally finished my writeups for #FCSC2024 , which covered: - Nginx X-Accel-Redirect file read - Werkzeug error-based request smuggling - HTTP/1.1 and HTTP/0.9 browser confusion - Connection: close bypass via Expect: 100-continue - ... Link 👇 1/2
2
36
182
5
8
73
@kevin_mizu
Kévin - Mizu
9 months
👀
@ANSSI_FR
ANSSI
9 months
[ECSC 2023 🇪🇺] L'équipe de France s’envole dans une semaine en Norvège pour l’ #ECSC2023 ! 🇫🇷 🔜 🇳🇴 Une présentation des hackeurs éthiques de l' @ECSC_TeamFrance s'impose🕵️ Envie d’en savoir plus ?➡️ 👀 @enisa_eu #ANSSI #CTF #TeamFrance #CyberMois
1
31
105
5
5
70
@kevin_mizu
Kévin - Mizu
2 years
After a week of hard work, @anssi_fr 's #FCSC2022 #CTF is finally over! I've finished 9th out of 646 senior challengers, and 13th out of 1524 overall! 🎉 You can find my #writeups here: Congratulations to all the other challengers! 👏
Tweet media one
9
15
69
@kevin_mizu
Kévin - Mizu
8 months
My first monthly @intigriti challenge is now available 🔥 Will you be able to solve it? 👀
@intigriti
Intigriti
8 months
⏰ It's CHALLENGE O'CLOCK! 👉 Find the FLAG before Tuesday November the 7th! 👉 Win €300 in SWAG prizes! 👉 We'll release a tip for every 100 likes on this tweet! Thanks  @kevin_mizu for the challenge! 👇
5
17
227
1
6
69
@kevin_mizu
Kévin - Mizu
10 months
Challenge's time is over ⏰ To solve it, you had to take part of the fact the it is possible to clobber a form using the following notation 👇 1/6
Tweet media one
@kevin_mizu
Kévin - Mizu
10 months
I wasn't knowing what to do yesterday night so, I decided to create an XSS challenge 🚩 There is nothing to win, I made it just for fun! If you want to try it out, click on the link below 👇 The final goal it to pop an alert without any interaction 🔥
Tweet media one
5
22
100
1
9
55
@kevin_mizu
Kévin - Mizu
1 year
My writeup for the march @intigriti #XSS challenge : Thanks @0xGodson_ and @BrunoModificato for the quality of the challenge 🙏
1
12
51
@kevin_mizu
Kévin - Mizu
1 year
I really enjoyed doing the @MidnightFlag 's qualification with my friends: @PerceSecu , @voydstack and @Nishacid (Maybe even more because we ended first :p) Thanks to all the challenge makers 🙏 My writeups are available here:
@MidnightFlag
Midnight Flag CTF
1 year
C'est terminé pour les qualifications de cette troisième édition du Midnight Flag CTF ! Merci à tous pour votre participation, nos partenaires et aux personnes ayant participé au live : - @AirbusCyber - @DGA - @/DGSE - @rootme_org - @BZHunt1 - @ESNABretagne - @ESNHACK -
Tweet media one
2
6
40
3
7
50
@kevin_mizu
Kévin - Mizu
2 years
This week, I solved an interesting challenge made by @0xItarow at @_barbhack_ 🌞 It was about RPO abuse on a file upload feature! You can find the writeup here: 🎉
1
20
48
@kevin_mizu
Kévin - Mizu
5 months
This issue looks incredible, but I don't understand how this could be triggered from the client-side. Does anyone have a more detailed write-up about it? Or simply more information? From the advisory, it seems to be a queue poisoning vulnerability, but I'm not sure 🤔
@disclosedh1
publiclyDisclosed
5 months
Internet Bug Bounty disclosed a bug submitted by @xer0dayz : - Bounty: $4,660 #hackerone #bugbounty
Tweet media one
0
8
75
2
3
47
@kevin_mizu
Kévin - Mizu
2 years
#YogoshaChristmas CTF is over and I ended 2nd over 92 users 🎉 You can find my #writeups here: Congratulations to all the other challengers! 👏
Tweet media one
3
5
44
@kevin_mizu
Kévin - Mizu
6 months
GG to all the solvers! However, no one solved it in the intended way :p Before giving my solution, I'm extending the challenge for another week with a fixed version! If you find the solution, please send me a DM 📮 The challenge is accessible here 👇
@intigriti
Intigriti
6 months
⏰ Intigriti's January Challenge is over! ✅ 37 hackers found the right solution!! 📑 7 hackers wrote a cool writeup! 🏆 Check out the winners below and drop your write-up in the comments!
1
4
72
2
7
44
@kevin_mizu
Kévin - Mizu
6 months
I'm really proud of this one. It's not an easy one, but I find the final chain super interesting! If you have some time, please take a look 🙏
@intigriti
Intigriti
6 months
⏰ It's CHALLENGE O'CLOCK! 👉 Pop an alert before Tuesday January the 15th! 👉 We'll release a tip for every 100 likes on this tweet! 👉 Thanks @kevin_mizu for the challenge! 👇
10
26
194
1
5
41
@kevin_mizu
Kévin - Mizu
3 months
We've made the web challenges with @BitK_ , if you have some times, come take a look 🚩 Can't wait to see how many times it will take someone to clear the category 👀
@ANSSI_FR
ANSSI
3 months
#FCSC2024 🐔 la compétition est ouverte ! 📢 Jusqu’au 14 avril, résolvez un maximum d’épreuves : crypto, reverse, pwn… pour gagner votre place au sein de l’ @ECSC_TeamFrance qui représentera la France à l’ECSC. 🚩 RkNTQ3tnbCZoZiF9 ➡️ À vous de jouer :
Tweet media one
3
32
58
4
7
41
@kevin_mizu
Kévin - Mizu
1 year
Last week, I organized with friends the @ctf_esaip , for this occasion, I made 5 web challenges 🚩 They were about mXSS, subdomain takeover, prototype pollution, OAuth... 🔥 I started to write my writeups, they can be found here: 🕸️
1
10
38
@kevin_mizu
Kévin - Mizu
2 years
Last week, I created 3 web challenges for the #10kCTF organised by @rootme_org . 🚩 They were about: URL parsing confusion, SQLi in prepared query and HTML sanitizer bypass! You can find the writeups here:
2
5
37
@kevin_mizu
Kévin - Mizu
3 years
Ce mois-ci, j'ai participé à mon premier CTF solo #DGhack et réussi à atteindre la 7ème place étudiante et 19ème générale! 🎉 Les différents WU soon dispo ici: Merci à la @DGA pour les challenges PS: Un tool d'XXE devrait sortir d'ici là fin de l'année👀
Tweet media one
5
3
36
@kevin_mizu
Kévin - Mizu
11 months
I hope that you will like them 😁
@rootme_org
Root-Me
1 year
Our contributors have struck again!! 5 new Web-Client challenges are now available on the #RootMe and Root-Me Pro environments. Thanks to @kevin_mizu for his remarkable work 👏! Good flag to all! 🚩
Tweet media one
1
4
19
1
3
32
@kevin_mizu
Kévin - Mizu
1 year
I made 2 #web challenges (one with my friend @_Worty ) for the @HeroCTF which occurred last 2 days 🚩 They were about header disclosure via client side path traversal, DOM Clobbering gadget in NextJs... 🔥 You can find writeups and sources here :
1
14
32
@kevin_mizu
Kévin - Mizu
11 months
Sad de pas avoir pu être sur la photo mais, tout de même content de notre résultat 🎉 Merci aux créateurs de challenges et à la @_barbhack_ pour le CTF 😁
@_barbhack_
Barbhack
11 months
Félicitations à La villa pour leur 2ème place au CTF
Tweet media one
2
3
66
2
1
27
@kevin_mizu
Kévin - Mizu
1 year
It was amazing to do this event with @xanhacks , @Gaburall and @PerceSecu thanks a lot @yeswehack 🙏
@yeswehack
YesWeHack ⠵
1 year
All done – our live #BugBounty at @nullcon Berlin has just come to an end! Many thanks to our partner @otto_de for your trust, a big round of applause to all the hunters and special shout out to our top 3: @hanno Noxious and @cWaveSoftware 👏 Here is
Tweet media one
Tweet media two
Tweet media three
1
11
59
0
0
27
@kevin_mizu
Kévin - Mizu
10 months
🇫🇷 🔥
@Hacker0x01
HackerOne
10 months
The results are in! 📊 The four teams moving on to Round 4 of the #AmbassadorWorldCup are #TeamParis 🇫🇷, #TeamIsrael 🇮🇱, #TeamNepal 🇳🇵, and #TeamSpain !🇪🇸 Congratulations to all AWC teams for the incredible teamwork and effort put into protecting our AWC partners. 🙌
Tweet media one
32
61
308
0
2
26
@kevin_mizu
Kévin - Mizu
2 years
I'm really proud to announce that 2 of my challenges have been released on @rootme_org 🔥 They introduce about DOM Clobbering and XS Leaks vulnerabilities🌐 You can find them here: - -
0
4
25
@kevin_mizu
Kévin - Mizu
2 months
It was fun looking for bugs with @ryotkak , @hash_kitten , @joaxcar , @TheGrandPew and @IcesFont 😁 As always, thanks to @cure53berlin for the reactivity 🙏 2/2
4
0
25
@kevin_mizu
Kévin - Mizu
3 years
Hello👋 Pendant le CTF web de l' @EuCyberCup , avec @Ooggule et @FeelProud_sec , nous avons obtenu le flag du 2ème challenge "Panid" d'une manière non attendue, vous pouvez retrouver le writeup ici : PS: Merci à l'admin pour le flag :)
1
2
22
@kevin_mizu
Kévin - Mizu
10 months
@intigriti As the payload it directly reflected from PHP to a JavaScript string, it is possible to use encoding notation to bypass PHP htmlspecialchars function 😁 For example, the following payload should makes an alert: \x3cimg src=x onerror=alert(1)\x3e
0
2
21
@kevin_mizu
Kévin - Mizu
6 months
@intigriti There is definitely an SSRF vulnerability, but if I'm not mistaken, recent Chromium versions no longer allow the about:blank page to frame the file:// wrapper. So, it shouldn't be possible to leak local files 🤔
2
0
20
@kevin_mizu
Kévin - Mizu
1 year
I found an interesting behaviour in the MDN documentation, In case of a sparse Array, MDN said that methods such as entries, values... shouldn't do an "in" check and treats empty slots as "undefined", but chrome and firefox do these checks. Source:
Tweet media one
1
1
19
@kevin_mizu
Kévin - Mizu
2 months
@Rhynorater @MtnBer Thanks for sharing the extension! If anyone is interested, it can be found here: . Btw, I'm working on new features that will allow, for example, hooking selectors occurring after an innerHTML. This would be useful for leveraging sanitized HTML inputs :D
1
5
18
@kevin_mizu
Kévin - Mizu
3 months
If you are doing bug bounty you should definitely check out @Icare1337 's research on LibreOffice 🔥
0
1
18
@kevin_mizu
Kévin - Mizu
4 months
@pilvar222 This is a nice trick! If you are interested, @terjanq have made a challenge / article about it: I also found something equivalent on drawio using a restrictive JSONP endpoint to bypass a CSP:
1
2
16
@kevin_mizu
Kévin - Mizu
7 months
@sudhanshur705 In case cookies are set to SameSite=Lax, you could abuse the fact that iframes load only SameSite=None cookies while loads both SameSite=None and SameSite=Lax 😁 1/2
1
1
15
@kevin_mizu
Kévin - Mizu
2 years
@yeswehack The vulnerability describe in the snippet is about RCE via custom python library overwrite. In fact, the upload features does not check if the file exist and didn't sanitize the filename making possible to path traversal.
1
0
15
@kevin_mizu
Kévin - Mizu
20 days
@sudhanshur705 @gregxsunday One of the biggest problems with HTML injection during PDF generation is that if it is sanitized, you can't see what happens during the PDF generation process. By using <plaintext>, you can get the raw HTML printed as text in the output :D
2
1
14
@kevin_mizu
Kévin - Mizu
9 months
DOMLogger++ has much more to offer, I let you explore its potential yourself! 😁 Key links: 🔗 - Github: - Firefox store: - Chromium store: 5/5
0
2
13
@kevin_mizu
Kévin - Mizu
4 months
@maple3142 Nice challenge :p
Tweet media one
0
0
13
@kevin_mizu
Kévin - Mizu
2 years
@Sonar_Research This challenge is about path traversal to template overwrite to RCE. In fact, it is possible to create a user which is called "../templates/error.html". This will cause the app to user the error.html template file as the current user's note.
2
0
12
@kevin_mizu
Kévin - Mizu
2 years
@yeswehack This challenge is about insecure password reset token generation to account takeover. In fact, the token is generated using md5(random_int(1000, 9999) which make it vulnerable to brute force.
3
0
11
@kevin_mizu
Kévin - Mizu
9 months
👀
@TheLaluka
Laluka
9 months
Hi friendz ! 🧙‍♂️ Prochain Stream : Mardi 17 Octobre à 21h ! 🔥 Topics : - Open-Sourcing push-my-diffs by @TheLaluka 🔭 - Kubestroyer, HowTo & WhatNot by @Rolix_cy 🧊 - Hooking client side sinks using DOMLogger++ by @kevin_mizu 🕸️ A très vite ! 😎🛠️
Tweet media one
1
9
35
0
0
12
@kevin_mizu
Kévin - Mizu
1 year
@intigriti This snippet of code is about open redirect to XSS via redirectURL get parameter 💥 1) regexUrl allows any protocol with numbers, chars and tab. 2) antiXSS block URL which start with JavaScript. Thus, using jAvAScRIPt: or \tjavascript: wrapper should bypass the check.
1
1
11
@kevin_mizu
Kévin - Mizu
2 years
Hello! Je m'y prends un peu tard mais, je suis à la recherche d'une place étudiante pour la @_barbhack_ , quelqu'un en aurait une en trop ? 😄
0
7
11
@kevin_mizu
Kévin - Mizu
7 months
@joaxcar Nice challenge again! Got it with a 30-char long payload :p Curious to see if other ppl will manage to solve it differently :D
Tweet media one
2
0
11
@kevin_mizu
Kévin - Mizu
6 months
It's time for a first hint 💡 Have you started reading the jQuery source code from the beginning of a $('selector') call to search for a gadget? If not, you should definitely start with it 😁
1
0
10
@kevin_mizu
Kévin - Mizu
2 months
@MtnBer @ctbbpodcast Thanks a lot for sharing 🙏 I'm currently working on new cool updates and templates. I'll share them soon :D
1
0
10
@kevin_mizu
Kévin - Mizu
5 months
@huntr_ai Thanks for the highlight! It's been a pleasure to look for issues in AI open source projects 😁 I hope to be able to find more cool bugs in the future!
1
0
10
@kevin_mizu
Kévin - Mizu
1 year
On vous prépare des trucs sympa 👀🍄
@ctf_esaip
CTF ESAIP
1 year
𝗖𝗧𝗙 𝗱𝗲 𝗹'𝗘𝗦𝗔𝗜𝗣 : 𝗹𝗲𝘀 𝗶𝗻𝘀𝗰𝗿𝗶𝗽𝘁𝗶𝗼𝗻𝘀 𝘀𝗼𝗻𝘁 𝗼𝘂𝘃𝗲𝗿𝘁𝗲𝘀 ! 👀 Les inscriptions pour la 6ème édition du CTF sont lancées. Étudiants, professionnels, préparez-vous pour la nuit du 26 mai ! 💥 👉🏻Rendez-vous sur : #CTF #Hack
0
9
27
0
0
10
@kevin_mizu
Kévin - Mizu
3 years
Last weekend, I did the @DamCTF with the @rhackgondins , We finished 12th over 550 student teams. 🎉 You can find my writeups here:
1
0
9
@kevin_mizu
Kévin - Mizu
2 years
Apache be like
Tweet media one
@YNizry
Yaniv Nizry
2 years
[1/4] TL;DR Apache httpd doesn't automatically return Content-type to files without name (but with extension) or files with only dots as a name. For example, test.jpg will return Content-Type: image/jpeg, but ...jpg will not
Tweet media one
8
95
394
0
1
8
@kevin_mizu
Kévin - Mizu
2 months
Other web challenges (made by @BitK_ ) writeups can be found in the #writeup channel of the CTF Discord server: Btw, all the #FCSC2024 challenges are available on ! 👀 Thanks @ECSC_TeamFrance again for the opportunity 💙 2/2
2
1
9
@kevin_mizu
Kévin - Mizu
7 months
To conclude, I would like to thank everyone who participated in this challenge 🙏 Furthermore, congrats to all the solvers and especially to the top 3: 🏆 @SecurityMB 🥈 @ixSly 🥉 @maple3142 Stay tuned, as another challenge might be released by the end of the year 👀 6/6
0
0
9
@kevin_mizu
Kévin - Mizu
1 year
I'm really sorry, but it seems that someone found it before me... He made a more complete article on his research, you can read it here:
1
2
8
@kevin_mizu
Kévin - Mizu
9 months
The true strength of DOMLogger++ is its flexible configuration ⚙️ With its JSON structure, you can easily hook any class, function, event, attribute, or custom elements 😎 For instance, the configuration below targets specific XSS sinks 🚰 2/5
Tweet media one
1
1
7
@kevin_mizu
Kévin - Mizu
7 months
@joaxcar @renniepak If using the Burp's browser is a problem, I've created an extension () which allows you to fully configure what you want to hook/replace and get a notifications from. It is not yet ready for auto prototype pollution detection, but it might be a solution :D
0
0
7
@kevin_mizu
Kévin - Mizu
5 years
Dans la perspective de disputer l'Open Tour et de participer à différentes LAN qui auront lieu cette année, nous nous associons à la structure @HegemoniaFrance qui nous accompagnera tout au long de cette saison 2019 #CKDO
0
2
7
@kevin_mizu
Kévin - Mizu
8 months
Only 2 days left and 11 solves so far! Anyone else to solve the challenge? 😁
@intigriti
Intigriti
8 months
@kevin_mizu Good news! The challenge is back online and we've extended the deadline to Friday night 🥳🎉 We'd like to apologize for the downtime, so please take this free hint 💜
Tweet media one
1
0
14
0
0
6
@kevin_mizu
Kévin - Mizu
2 months
Nice challenge, worth spending some time on! 😄
@joaxcar
Johan Carlsson
2 months
⛳️ Challenge time Was a while since I did one of these. Don't post solutions in the thread; send a DM! The flag is in the fragment of the URL. Pop an alert with the flag. Will patch unintended solutions as they drop in 😅
8
9
73
0
1
7
@kevin_mizu
Kévin - Mizu
1 year
@intigriti This is a self XSS abuse to leak sensitive content in the DOM. Thanks to the opener link (check ), it is possible to setup 2 windows, 1 with the victim card and another with the XSS (CSRF) which will be able to access opener info (same origin) :p
2
0
7
@kevin_mizu
Kévin - Mizu
6 months
I think it's time for a second hint ⏰ Everything happens inside the .select(). Perhaps you should find a way to bypass the document checks to reach it?
1
0
7
@kevin_mizu
Kévin - Mizu
1 year
@0x1sis They are, it's a bug! You should find them from here:
0
5
7
@kevin_mizu
Kévin - Mizu
9 months
Once your JSON configuration is set and domains selected, you can fetch logs via devtools or webhook! 🔥 The devtools panel leverages datatable's strength and custom filters for detailed log analysis 🔎 For instance this is how it could looks like 👀 4/5
Tweet media one
1
0
6
@kevin_mizu
Kévin - Mizu
1 year
@intigriti I've recently gave a small flask / HTML PoC for this vulnerability which can be found here:
0
0
6
@kevin_mizu
Kévin - Mizu
10 months
As nobody found the solution after 2 days, I'm giving a first tip 💡 "Sometimes, removing your own creation is the only way to get out"
0
1
6
@kevin_mizu
Kévin - Mizu
1 year
0
0
6
@kevin_mizu
Kévin - Mizu
1 year
👀
@HeroCTF
HeroCTF
1 year
Mark your calendars, because HeroCTF v5 is coming with a lot of very cool challenges ! 😎 📆 12th-14th of May 2023 (registration opens in April) 📌 Online (team up to 5) 🔁 Help us by sharing this post
0
35
78
0
0
6
@kevin_mizu
Kévin - Mizu
2 months
@joaxcar As always, nice challenge! :D
Tweet media one
0
0
6
@kevin_mizu
Kévin - Mizu
6 months
It looks like we have our first intended solver, gg @Disnaming 🩸
1
0
6
@kevin_mizu
Kévin - Mizu
1 year
@intigriti On the above sniper, the vulnerability occurs in JWT token verification. In fact, the key used for the token verification is read from a file defined by the JWT kid value (inside his header). This value can be change by an attacker by whatever he wants.
1
1
5
@kevin_mizu
Kévin - Mizu
2 months
Congratz to the third solvers 🔥 - @hulitw and @BrunoModificato 🥉
1
0
5
@kevin_mizu
Kévin - Mizu
3 years
@arn_hack @dls_si @h4ck0liques @rhackgondins Gg les gars! Juste beaucoup trop fort 🚩
0
0
5
@kevin_mizu
Kévin - Mizu
2 years
Can't wait to see you there 🔥
@podalirius_
Rémi GASCOU (Podalirius)
2 years
Next week I will present a #talk at #BlackHat Europe 2022 on how to automate the search of RPC functions allowing to coerce authentications on #Windows . Alongside this talk, I'm publishing a brand new version of #Coercer ! ➡️Check it out here:
Tweet media one
3
65
167
1
0
5
@kevin_mizu
Kévin - Mizu
1 year
@_Worty also made an excellent writeup ( ) feel free to read it! 🔥 If you want to try challenges by yourself, sources are available here: 👀
1
0
5
@kevin_mizu
Kévin - Mizu
10 months
To conclude this short write-up, I would like to congrats the 3 flaggers of the challenge: 🏆 @Blaklis_ 🥈 @pilvar222 🥉 @ankursundara Solution link: 🎉 6/6
0
1
5
@kevin_mizu
Kévin - Mizu
6 months
It looks like I forgot an unintended solution 🥲
1
0
5