• XSS.stack #1 – первый литературный журнал от юзеров форума

Мануал/Книга [BlackHat USA 2024] Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls

weaver

31 c0 bb ea 1b e6 77 66 b8 88 13 50 ff d3
Забанен
Регистрация
19.12.2018
Сообщения
3 301
Решения
11
Реакции
4 622
Депозит
0.0001
Пожалуйста, обратите внимание, что пользователь заблокирован
Description
Websites often parse users' email addresses to identify their organization. Unfortunately, parsing emails is far from straightforward thanks to a collection of ancient RFCs that everyone knows are crazy. You can probably see where this is going…

In this session, I'll introduce techniques for crafting RFC-compliant email addresses that bypass virtually all defenses leading to broken assumptions, parser discrepancies and emails being routed to wildly unexpected destinations. I'll show you how to exploit multiple applications and libraries to spoof email domains, access internal systems protected by 'Zero Trust', and bypass employee-only registration barriers.

Then I'll introduce another class of attack - harmless-looking input transformed into malicious payloads by unwitting libraries, leading to yet more misrouted emails, and blind CSS injection on a well-known target.

I'll leave you with a full methodology and toolkit to identify and exploit your own targets, plus a CTF to develop your new skillset.
blackhat.com/us-24/briefings/schedule/#splitting-the-email-atom-exploiting-parsers-to-bypass-access-controls-39193

slides

whitepaper

git
https://github.com/portswigger/splitting-the-email-atom
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх