People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
auth.tesla.com as an SSO provider for external customers. For internal employees, they uses sso.telsa.com as an iDP. auth.tesla.com, they user realized it is possible to create emails for both @tesla.com and @teslamotors.com. Trying to create already created emails, like ones from internal employees, was not allowed. So, what can we do with this?iss field is what was important here. A super interesting bug!AggregatorProxy, which interacts with the trading price contract directly. Within this, the latestRoundData() is called.UniswapAnchoredView contract manages the price for multiple assets. This has two price feeds: a trusted source (chainlink) and an anchor price (uniswap). If the posted price deviates too much from the anchor price, then the program will revert. __VIEWSTATE parameter, which is sent on every request the user sends. __VSTATE and compressed it.__VSTATE.'testinguser' host='1.3.3.7' would change the host.host of the server. Why does this matter? We can trick the application to use our database for the login process! Since we know our password, this allows for a complete authentication bypass. null. preg_match are wrapped in an if statement. If anything malicious is found, then return. Otherwise, continue on. Since null is being returned instead of a value, the verification for the malicious input can be bypassed. [0] inside of it.RST_STREAM byte sequence. Canceled streams do not get counted in the limit of open streams. RST_STREAM, a DoS can be triggered. The opening of a new stream slot and the computational resources to clean up cause a problem. With Cloudclare, they copy the socket into a buffer and process the buffer. Once the cancellation happens, this processing stops but still has eaten up a lot of resources.