Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

My Name Is Johann Wolfgang Von Goethe - I Can Prove It- 139

Sec-ConsultPosted 6 Years Ago
  • The authentication on the site uses a SAML based model.
  • During the digital signature check on the application, it uses the first parameter even though multiple can be specified.
  • This creates a HTTP Parameter Poising vulnerability that can bypass security features.