Md Ismail Šojal 🕷️ Profile picture
Dec 19, 2022 8 tweets 2 min read Read on X
Insecure CORS Configuration" vulnerabilities. 🛡️⚔️

[A thread 🧵]

#infosecurity #CyberSec #bugbountytips #cybersecurity
[2/n]
What is Insecure CORS issue?

An insecure CORS configuration allows any website to trigger requests with user credentials to the target application and read the responses thus enabling attackers to perform privileged actions or to retrieve potential sensitive information
[3/n]

Basic Origin Reflection Test:

Req: Origin: evil[.]com
Res: Access-Control-Allow-Origin: evil[.]com

> In this test case check if your Origin Header is being reflected within the Access-Control-Allow-Origin Header. If yes, this may be a vulnerability.
[4/n]

Allows Wildcards:

Req: Origin: random[.]com
Res: Access-control-allow-origins:*

> If the target application reflects with * in Access-control-allow-origin response header, It means it's vulnerabile to CORS misconfiguration issue.
[5/n]

Allows Null Origin:

Req: Origin: null
Res: Access-control-allow-origins:null

> on sending Origin: header set to Null if the application reflects null is ACAO header , This is vulnerable and can be exploited using sandboxed iframes.
[6/n]

Bad Regex Validation

Req: Origin: domain[.]com[.]snapsec[.]com
Res: Access-control-allow-origins:null

Let say if the web app only looks for "domain[.]com" in the origin this can be easily bypassed using "domain[.]com[.]snapsec[.]com".
[7/n]

Allowing Subdomains

Req: Origin: sub[.]domain[.]com
Res: Access-control-allow-origins: sub[.]domain[.]com

in this case the website allows all its subdomains, This issue can be exploited by finding a valid XSS issue on any of its subdomain.
[8/n]

Support trusted by HTTP domain names

Req: Origin: http://domain[.]com
Res: Access-control-allow-origins: http://domain[.]com

In this situation, an attacker who is in a position to intercept a victim user's traffic can exploit this CORS configuration.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Md Ismail Šojal 🕷️

Md Ismail Šojal 🕷️ Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @0x0SojalSec

Feb 23
RIP fine-tuning ☠️

Forget fine-tuning. This Stanford + SambaNova paper just killed it.👀

LLMs self-improve… without fine-tuning. How?

What if your LLM could fine-tune itself… without ever touching weights?

It’s called 'Agentic Context Engineering (ACE)' and it proves you can make models smarter without touching a single weight.

Instead of retraining, ACE evolves the context itself.

The model writes, reflects, and edits its own prompt over and over until it becomes a self-improving system.

Think of it like the model keeping a growing notebook of what works.
Each failure becomes a strategy. Each success becomes a rule.

The results are absurd:

+10.6% better than GPT-4–powered agents on AppWorld.
+8.6% on finance reasoning.
86.9% lower cost and latency.
No labels. Just feedback.

Everyone’s been obsessed with “short, clean” prompts.

ACE flips that. It builds long, detailed evolving playbooks that never forget. And it works because LLMs don’t want simplicity, they want *context density.

If this scales, the next generation of AI won’t be fine-tuned.
It’ll be self-tuned.

The next AI era isn't fine-tuned… It's self-tuned

(0/1)Image
How ACE works :

Agentic Context Engineering (ACE) enhances LLMs by dynamically evolving prompts through three roles:

into 3 roles:

Generator - runs the task
Reflector - critiques what went right or wrong
Curator - updates the context with only what matters

Each loop adds delta updates, small context changes that never overwrite old knowledge.

It’s literally the first agent framework that grows its own prompt.

(1/2)Image
Every prior method had one fatal flaw:
-context collapse.
- Models rewrite their entire prompt each time
- it gets shorter
- details vanish
- accuracy tanks.

In the paper, one model’s accuracy fell from 66.7 - 57.1 after a single rewrite.

ACE fixes that by never rewriting the full context - only updating what changed.

(2/3)Image
Read 7 tweets
Apr 13, 2023
Top free #Cybersecurity and ethical #hacking certification⚔️📓

1./Introduction to IT & Cybersecurity (Cybrary) = cybrary.it/course/introdu…

2./Mobile App Security (Cybrary) = cybrary.it/course/mobile-…

3./Introduction to Cybersecurity (edx) = edx.org/course/introdu…
4./Introduction to Cyber Security (Future Learn) = futurelearn.com/courses/introd…

5./Introduction to Encryption and Cryptography (Future Learn) = futurelearn.com/courses/encryp…

6./Fundamentals of Red Hat Linux (edx) = edx.org/course/fundame…
7./ Introduction to Cybersecurity (Codecademy) = codecademy.com/learn/introduc…

8./ Cisco Networking Academy = netacad.com/courses/all-co…

9./ SANS Cyber Aces (covers foundation areas of cybersecurity) - cyberaces.org/courses.html

10./ Opensecurity - = opensecuritytraining.info/Training.html
Read 4 tweets
Jan 9, 2023
Training/Methodology #infosec #offensivesec⚔️🛡️

- OSINT Training and Workflow (dfir.training/osint)

- Website Investigation Workflow ()

- OSINT Resources & Tutorials (aware-online.com/en/)

- Learning Overpass API (osmlab.github.io/learnoverpass/…)
- A 5-minute guide to creating a covert account for Internet Investigations (OSINT) (intelligencewithsteve.com/post/a-5-minut…)

- hat’s in a Company? Guide for investigate a company (kit.exposingtheinvisible.org/en/what/compan…)

- Osint : Comment naviguer en eaux troubles (daring-india-marten-972.medium.com/osint-comment-…)
- Amnesty International Course : Open Source Investigations for Human Rights (advocacyassembly.org/en/partners/am…)

- OSINT : Explorer l’espace informationnel Russe (docs.google.com/document/d/10a… from )
- OSINT Russia Resources (start.me/p/0PeKwy/osint…)
Read 4 tweets
Jan 9, 2023
Several people asked me about the resources I recommend for learning GraphQL and GraphQL Hacking . Here is the list:

A Thread 🧵👇

GraphQL Basics:
- GraphQL in 40 Minutes:
- GraphQL in-depth:
- Great Website all about GraphQL: howtographql.com
Read 6 tweets
Nov 26, 2022
List of 50 cybersecurity podcasts:
#infosec #cybersecurity #podcasts #infosecurity Image
1. Cyber Work
2. Click Here
3. Defrag This
4. Security Now
5. InfoSec Real
6. InfoSec Live
7. Simply Cyber
8. OWASP Podcast
9. We Talk Cyber
10. Risky Business
11. Malicious Life
12. Hacking Humans
13. What The Shell
14. Life of a CISO
15. H4unt3d Hacker
16. 2 Cyber Chicks
17. The Hacker Mind
18. Security Weekly
19. Cyberside Chats
20. Darknet Diaries
21. CyberWire Daily
22. Absolute AppSec
23. Security in Five
24. Smashing Security
25. 401 Access Denied
26. 7 Minute Security
27. 8th Layer Insights
28. Adopting Zero Trust
29. Cyber Security Sauna
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(