The article is informative and intended for security specialists conducting testing within the scope of a contract. The author is not responsible for any damage caused by the application of the provided information. The distribution of malicious programs, disruption of system operation, and violation of the confidentiality of correspondence are pursued by law.
Introduction In this article, I want to talk about a method for bypassing DOMPurify when it is used for sanitizing SVG files, which I recently discovered.…
The article is informative and intended for security specialists conducting testing within the scope of a contract. The author is not responsible for any damage caused by the application of the provided information. The distribution of malicious programs, disruption of system operation, and violation of the confidentiality of correspondence are pursued by law.
Introduction This article will be dedicated to my research in the field of email service attacks, including all aspects related to email messages.…
Introduction This article is dedicated to a series of tricks utilizing the modern capabilities of IPv6 and the shortcomings of address parser implementations in standard libraries of popular programming languages.
IPv6 Zone I think many people have an idea of what IPv6 and IPv4 addresses look like:
2001:0db8:85a3:0000:0000:8a2e:0370:7334 - IPv6 192.168.0.1 - IPv4 When including an IPv6 address in a URL, it needs to be enclosed in square brackets []:…