Taking down Twitter
I had the opportunity (probably) to take down Twitter today. Or at least stir up a whole lot of trouble. I really can't believe I'm the first person t[......]Read more
View ArticleTwitter Exploit Still Not Fixed
Sigh. I wrote another article on Dave Naylor's blog about the XSS exploit I found yesterday. It seems they've made a pretty amateurish attempt to f[......]Read more
View ArticleCyber Security Challenge Cipher Solution
I was pointed to the Cyber Security Challenge earlier this week, and eventually stumbled upon the cipher they offer as an "immediate opportunity to te[......]Read more
View ArticleHacking the AMX NXA-WAP250G Access Point (with a Raspberry Pi)
A post on the (aptly named) /dev/ttyS0 device hacking blog entitled "Reverse Engineering Serial Ports" reminded me that I had an AMX NXA-WAP[......]Read more
View ArticleRemoving Spammy Links (through Blind SQL Injection)
I was looking at a particularly bad example of a website littered with tens of thousands of spam comments. There didn't appear to be a real comment[......]Read more
View ArticleI did Microsoft’s BlueHat Challenge…
... and all I got was this (virtual) T-Shirt. Sorry. Poor attempt at a joke, and not even technically true; I received two virtual T-Shirts for my[......]Read more
View ArticleCross-Origin Message Vulnerability on xbox.com
A couple of months ago I found a vulnerability on Microsoft's xbox.com website. Background Modern web browsers severely restrict what content lo[......]Read more
View Article
More Pages to Explore .....