nischalxd Profile Banner
Nischal Karki Profile
Nischal Karki

@nischalxd

Followers
260
Following
12K
Statuses
200

Look how far we've come.

Nepal
Joined May 2020
Don't wanna be here? Send us removal request.
@nischalxd
Nischal Karki
2 days
@SirBagoza @PortSwigger It has crashed so many times that now I am using dev tools.
2
0
4
@nischalxd
Nischal Karki
3 days
@MiniMjStar I think reading the full article is better than watching the presentation. In the research paper, everything is explained in detail.
1
0
2
@nischalxd
Nischal Karki
3 days
@MiniMjStar The cache server has to nomarlize the path before taking it into the cache key and forward it to the origin server with dot segments. The origin server will return 404 since it doesn't do any normalization for the DS. Which will poison the path with or without DS.
2
0
3
@nischalxd
Nischal Karki
3 days
@MiniMjStar Yeah. Some programs doesn't consider cpdos as a threat when it affects static resources only. But it is actually a really serious threat and can easily make website unresponsive. Most programs do accept them.
1
0
2
@nischalxd
Nischal Karki
3 days
@MiniMjStar Try doing it manually. You will learn a lot of things and it will be easy to find different exploit chains after spending a good time with the target. Automation will miss a heck lot of things.
1
0
2
@nischalxd
Nischal Karki
3 days
@MiniMjStar It was an example. Some applications use custom header to make arbitrary changes to the certain files. It can be JS, CSS or images etc. And if it is not included in the cache key, you can pretty much exploit jt for DoS.
1
0
2
@nischalxd
Nischal Karki
3 days
@MiniMjStar Nope. I think manually looking for such issues are more reliable since there can be lots of ways to check for such issue and also it depends on application how they treat such discrepancies.
1
0
2
@nischalxd
Nischal Karki
4 days
@harshleenchawl2 Not really.
0
0
0
@nischalxd
Nischal Karki
4 days
@addydaddymc Sometimes application might disclose it on response headers or in JS files. When you see any application using weird response header, just try that header in the request and observe if it is doing anything with the response. And ofcourse of you can cache the malformed response.
0
0
5
@nischalxd
Nischal Karki
4 days
0
0
2
@nischalxd
Nischal Karki
4 days
@iamunixtz Congrats!!
0
0
1
@nischalxd
Nischal Karki
5 days
0
0
1
@nischalxd
Nischal Karki
7 days
@mahfujwhh @intigriti Congrats!!
0
0
1
@nischalxd
Nischal Karki
7 days
@th3yca1m3Mufasa @PortSwigger Keep going... a hit is a hit even though if it was a dupe.
0
0
3
@nischalxd
Nischal Karki
7 days
@ParamJani21 Thanks buddy. It was just simple ffuf command, nothing really interesting. I just fuzzed most vulnerable headers and wrote a script to filter out all cacheable domains and also checked if they are vulnerable to cache poisoning issues.
0
0
7
@nischalxd
Nischal Karki
7 days
@Cyberruler Thanks buddy !!
0
0
2
@nischalxd
Nischal Karki
7 days
@moe1n1 Don't tell me, you have waited a year to receive bounties as well. I have few pending bounties from months and still haven't gotten it.
1
0
0
@nischalxd
Nischal Karki
7 days
@moe1n1 WTF ????????????? You telling me, I have to wait a YEAR just for them to close it.
0
0
0