“GTFO MR. USER” is the talk from the speaker David Sopas at BSidesLisbon 2017. The co-founder of Char49 will present real case scenarios (aka hacking to PoC) showing the danger of large organizations ignoring high and critical security issues, with repercussions that would affect millions should the security threats fall into the wrong hands. Additionally, … Continue reading GTFO Mr. User
We are proud to annouce that Char49 will be present at BSidesLisbon 2017, next November 9th and 10th. As one of the sponsors we have also some guys “talking about security” and participate on the several activities during those 2 days. BSidesLisbon is the premier technical information security conference in Portugal and celebrates this year its … Continue reading Char49 at BSidesLisbon 2017
Our Security Ninja Miguel Regala found a vulnerability on drive.google.com. It’s a common problem of data exposure, without PII leak, but rarely found in production environment. Google security team gave a quick answer and in a very transparent process the bug was fixed in a short period of time. Miguel appears now at Google’s Hall … Continue reading Vulnerability on drive.google.com
Our team leader found a stored XSS in olx.pt. When submiting a new ad, it was possible to add a XSS payload on data[person]. The ad got approved without reflection on the output of this field, it was sanitized. Afterwards when we try to edit the ad, the payload was launched, so the input wasn’t sanitized when added … Continue reading Stored XSS in olx.pt
When our security team leader started his path on HackerOne he started with Adobe bug bounty program. David already was present on their Security Acknowledgements list (2013) but he wanted to get a big company on his HackerOne profile so after a while he found a Reflected XSS (CWE-79) on their website. You may notice that … Continue reading We got Adobe XSSed
David Sopas is the security team leader at Char49 and he is sharing great tips at Cobalt’s Blog on how writing great vulnerability reports can have a huge impact in your bug bounties career. The article covers best practices on preparation, writing and also tools used. Go check it out.
Char49 was present at the event ØxＯＰＯＳɆＣ Mɇɇtuᵽ at Blip facilities in Oporto. On the agenda some interesting topics like “Ransomware 101: Threats & Countermeasures” by netshark and “In Headers/ Padlocks / site Seals / CA’s we trust!” by pipas. It a was a nice way to spend the afternoon having fun and always learning something new … Continue reading Char49 @ ØxＯＰＯＳɆＣ Mɇɇtuᵽ
David Sopas is the security team leader in Char49 and he is always looking for a new challenge. Today he presents his top 10 vulnerability list to reach #1 at Cobalt bounty programs, with a clear description of each one. Check out this article on Cobalt Blog from our researcher and team leader.
One of the most interesting vulnerabilities that could potentially allow Remote Code Execution (RCE). Check out this article from our researcher Miguel Regala on Cobalt Blog.
Our lab found a interesting XSS on a .swf file that we later discover was mainly used on phishing websites. Source code of typewrite_header.swf: //———————————————————————- //Frame 3 //———————————————————————- gotoAndPlay (2); //———————————————————————- //Frame 1 //———————————————————————- var q = 1; var myurl = “http://xxxxxxxxxxxxxxxxxxxxxxxxx/”; var mytext1 = _root.thetitle; var mytext2 = _root.thestrap; _global.mytext = ((“” + mytext1) … Continue reading Flash XSS on typewrite_header.swf