V4uban 's Avatar

V4uban

@v4uban.bsky.social

AppSec Engineer. Application Security, DevSecOps, Threat Modelling. OWASP and Open Source enthusiast. Based in Barcelona.

382 Followers  |  132 Following  |  12 Posts  |  Joined: 19.11.2024  |  1.8411

Latest posts by v4uban.bsky.social on Bluesky

Preview
GitHub - OWASP/wrongsecrets: Vulnerable app with examples showing how to not use secrets Vulnerable app with examples showing how to not use secrets - OWASP/wrongsecrets

We released version 1.11.2 of #OWASP #WrongSecrets: it's faster than ever, has now 55 challenges and a lot of fun! Check it out at github.com/OWASP/wrongs... or test it at www.wrongsecrets.com and don't forget to give the repo a 🌟 if you like it!

02.05.2025 10:33 β€” πŸ‘ 17    πŸ” 6    πŸ’¬ 1    πŸ“Œ 1
Post image

I just built a custom action to let you test for race conditions with a single click! No tab groups required, and it uses the cutting edge single-packet attack under the hood: gist.github.com/albinowax/10...

For more info check out portswigger.net/research/sma...

23.04.2025 14:31 β€” πŸ‘ 16    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

Ever heard of LLM poisoning? πŸ€”

Recently, Leif Dreizler joined Travis McPeak and William Bengtson on the @404security.bsky.social podcast to discuss how misinformation websites are intentionally spreading fake news to influence AI model responses.

🎧 Listen here: www.resourcely.io/podcast/deal...

04.04.2025 16:18 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

I will for sure!

04.04.2025 17:11 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I will attend!

02.04.2025 18:18 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Lesley, What Happened to the β€œCybersecurity Skills Shortage”? Are you stressed out right now? I’m stressed out. Most Americans are, and cybersecurity job seekers are definitely not an exception. I do a ton of career mentoring and career clinics, and I s…

Hello friends. The dreaded and long awaiting blog on WHAT THE FUCK HAPPENED TO THE CYBERSECURITY JOBS MARKET has arrived.

tisiphone.net/2025/04/01/l...

I'm sorry.

02.04.2025 03:04 β€” πŸ‘ 276    πŸ” 84    πŸ’¬ 16    πŸ“Œ 10
Post image

As a follow up to @maxenceschmitt.bsky.social's amazing #CSPT research, we've published a list of resources to help people interested in this class of vulnerabilities. Check it out today for video, tools, challenges and variety of publications!

blog.doyensec.com/2025/03/27/c...

#Doyensec #appsec

27.03.2025 16:46 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
State of Threat Modeling (SOTM) 2024 Survey Welcome to the first-ever State of Threat Modeling (SOTM) Survey! What is the SOTM Survey? The SOTM Survey is part of the research for the first community-driven State of Threat Modeling (SOTM) Repor...

The Threat Modeling Connect community are launching the first-ever community-driven State of Threat Modeling (SOTM) Report, led by @rewtd.bsky.social
and Dave Soldera, and we’d love your input!
docs.google.com/forms/d/e/1F...
The survey will take 15-20 minutes to complete.

#cybersec #infosec

14.03.2025 09:20 β€” πŸ‘ 21    πŸ” 15    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

OWASP Global AppSec EU 2025 Barcelona: full training schedule is out now!

Day 3 is packed with even more hands-on training sessions to enhance your AppSec expertise!

Register now:
owasp.glueup.com/eve...

#AppSecEU2025 #Cybersecurity #DevSecOps #SecureCoding #ThreatModeling #Infosec #Barcelona

24.03.2025 07:04 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Exciting news! The #OWASP Global #Appsec SF videos have arrived! πŸŽ₯ Get ready to boost your knowledge and skills by checking them out here: www.youtube.com/play...

21.03.2025 16:30 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
SAML roulette: the hacker always wins Introduction In this post, we’ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library

You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study.

portswigger.net/research/sam...

18.03.2025 14:57 β€” πŸ‘ 52    πŸ” 23    πŸ’¬ 0    πŸ“Œ 4
Slack Invite

There's now a ZAP Slack that's open to everyone. You can get an invite to it via zaproxy.org/slack/invite

24.02.2025 13:45 β€” πŸ‘ 9    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
AppSec Ezine

AppSec Ezine - 573rd pathonproject.com/zb/?3970e59b... #AppSec #Security 🎁

08.02.2025 11:31 β€” πŸ‘ 5    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Post image

πŸ€” Based on issues that I have seen during recent assessments, I updated my code sharing project with a method related to JWT based tokens:

#appsec #appsecurity #jwt #web

🌍 URL:
github.com/righettod/co...
righettod.github.io/code-snippet...

09.02.2025 16:59 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Get ready for an eye-opening session with Kevin Hemmingsen, Director of Trust & Security at Bugcrowd as he explores lessons from bug bounty / offsec to help devs build more securely at the OWASP Security Summit!

OWASP Community Save 25% on tickets: http://www.eventbrit...

09.02.2025 21:40 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Practice on Portswigger Academy

06.02.2025 22:50 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Top 10 web hacking techniques of 2024 Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year

The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2024! portswigger.net/research/top...

04.02.2025 15:02 β€” πŸ‘ 66    πŸ” 36    πŸ’¬ 2    πŸ“Œ 5
GET /%0D%0ASet-Cookie: foo=bar
403 Forbidden

GET /%E4%BC%8D%E4%BC%8ASet-Cookie: foo=bar
200 OK
Set-Cookie: foo=bar

GET /%0D%0ASet-Cookie: foo=bar 403 Forbidden GET /%E4%BC%8D%E4%BC%8ASet-Cookie: foo=bar 200 OK Set-Cookie: foo=bar

Discover blocklist bypasses via unicode overflows using the latest updates to ActiveScan++, Hackvertor & Shazzer! Thanks to Ryan Barnett and Neh Patel for sharing this technique.

portswigger.net/research/byp...

28.01.2025 14:01 β€” πŸ‘ 39    πŸ” 22    πŸ’¬ 0    πŸ“Œ 0
Post image

Sarah-Jane Madden is a keynote speaker at OWASP Global AppSec EU 2025

🎟️ Attention to those in App Sec, Cybersecurity, and Developers: take advantage of the early bird discount!

Don’t wait, register now!

owasp.glueup.com/eve...

#owaspglobalappseceu2025 #AI #threatmodeling #devsecops #infosec

29.01.2025 08:05 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

I've just released HTTP Request Smuggler 2.17 which fixes a nasty Client-Side Desync false-negative. Big thanks to @t0xodile.com for reporting it! Hope you all find some nice CSDs in 2025 :)

07.01.2025 10:45 β€” πŸ‘ 34    πŸ” 5    πŸ’¬ 1    πŸ“Œ 1
Preview
First Tokens: The Achilles’ Heel of LLMs The Assistant Prefill feature available in many LLMs can open up models to jailbreaking, including the possibility of persistent prefills to bypass LLM safety alignments.

The article: www.invicti.com/blog/securit...

13.01.2025 08:46 β€” πŸ‘ 11    πŸ” 1    πŸ’¬ 2    πŸ“Œ 0
Preview
Top ten web hacking techniques of 2024: nominations open Nominations are now open for the top 10 new web hacking techniques of 2024! Every year, security researchers from all over the world share their latest findings via blog posts, presentations, PoCs, an

Nominations are now open for the Top 10 Web Hacking Techniques of 2024! Browse the contestants and submit your own here:
portswigger.net/research/top...

08.01.2025 14:09 β€” πŸ‘ 28    πŸ” 19    πŸ’¬ 1    πŸ“Œ 4
Post image

🚨 Attention all developers and code enthusiasts! Get ready to elevate your skills with "Alice and Bob Learn Secure Coding." Secure your copy now and embark on a transformative learning experience.
shehackspurple.ca/bo...

31.12.2024 16:19 β€” πŸ‘ 9    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
Burp suite pro tips and tricks for hacking Burp suite pro tips and tricks for hacking - Download as a PDF or view online for free

Somebody uploaded to SlideShare the slides of my talk at @northsec.bsky.social 2023 🌐

It’s the sequel of the first @burpsuite.bsky.social talk I ever gave, exactly 10 years before πŸ› οΈ

Enjoy these 50 slides of Burp tips πŸŽπŸŽ…

23.12.2024 22:00 β€” πŸ‘ 38    πŸ” 18    πŸ’¬ 0    πŸ“Œ 0

Extended the starter with shy writers! πŸ˜€ If you're not on the list but write about web security, then feel free to reply with the article you're most proud of, and I will add you to the pack!

Make sure to resubscribe to not not miss on the amazing 🌐research!

go.bsky.app/9JXnB17

10.12.2024 22:29 β€” πŸ‘ 29    πŸ” 10    πŸ’¬ 9    πŸ“Œ 0
Screenshot of Burp's HTTP settings, where streaming URLs must be defined

Screenshot of Burp's HTTP settings, where streaming URLs must be defined

Chunked response as seen in Repeater, with chunk metadata (their size) not stripped

Chunked response as seen in Repeater, with chunk metadata (their size) not stripped

Ever wondered why you NEVER see chunked responses in Burp? πŸ€”

The answer is simple, default settings hide them! 🫣

Go to "Settings > Network > HTTP > Streaming responses" to make them appear πŸ”

20.12.2024 07:23 β€” πŸ‘ 20    πŸ” 6    πŸ’¬ 0    πŸ“Œ 2

Check out the tools I've been working on this year:
πŸ” Hackvertor: Web app: hackvertor.co.uk
πŸ”’ Hackvertor BApp: portswigger.net/bappstore/65...
⚑ Shazzer: shazzer.co.uk
πŸ› οΈ Recorder: Chrome extension: chromewebstore.google.com/detail/burp-...
πŸ•΅οΈ DOM Invader: portswigger.net/burp/documen...

20.12.2024 13:27 β€” πŸ‘ 16    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Overview of the attack flow

Overview of the attack flow

Overview of how a large number of credentials were leaked

Overview of how a large number of credentials were leaked

Clusters of fake GitHub profiles

Clusters of fake GitHub profiles

Phishing e-mail

Phishing e-mail

New research: We've been monitoring a threat actor publishing dozens of trojanized GitHub repositories targeting threat actors, leaking hundreds of thousands of credentials along the way

securitylabs.datadoghq.com/articles/mut...

16.12.2024 13:08 β€” πŸ‘ 22    πŸ” 13    πŸ’¬ 0    πŸ“Œ 0
Post image

🀫 #sneakpeek #BurpSuite #Intruder

12.12.2024 13:15 β€” πŸ‘ 11    πŸ” 4    πŸ’¬ 2    πŸ“Œ 0
Preview
How does Snyk DCAIF Work under the hood? | Snyk Read our technical deep-dive into how Snyk's DCAIF works. To start, with Snyk's Deep Code AI Fix, simply register for a Snyk account here, enable DeepCode AI Fix in your Snyk settings, and start reliably auto-fixing vulnerabilities in seconds.

Snyk SAST has a pretty clever trick to find and fix security vulnerabilities in your code

It applies a CodeReduce algorithm to "compress" your own program code before feeding it to an AI model and this results in improved by 20% success rate of security fixes:

13.12.2024 07:01 β€” πŸ‘ 6    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

@v4uban is following 20 prominent accounts