<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sp1d3R &#8211; Sp1d3R&#039;s security blog</title>
	<atom:link href="/author/sp1d3r/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>&#34;I accidentally broke it.&#34;</description>
	<lastBuildDate>Sat, 23 Apr 2022 21:51:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.4.2</generator>
	<item>
		<title>Tricky out-of-band RCE via Java EL injection</title>
		<link>/out-of-band-rce-via-el-injection/</link>
		
		<dc:creator><![CDATA[Sp1d3R]]></dc:creator>
		<pubDate>Sat, 27 Jul 2019 14:57:52 +0000</pubDate>
				<category><![CDATA[Writeups]]></category>
		<guid isPermaLink="false">https://xpoc.pro/?p=281</guid>

					<description><![CDATA[It&#8217;s been a long period of silence here. I don&#8217;t blogging much nowadays, mostly because I can&#8217;t spend much time online due to health conditions and there was nothing special in my findings which could be worth a blogpost. I decided to write if there will be some unique or less documented behavior in my <a class="read-more" href="/out-of-band-rce-via-el-injection/">&#8230;&#160;<span class="meta-nav">&#8594;</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>OAuth authentication bypass on Airbnb acquisition using 1-char Open Redirect</title>
		<link>/oauth-authentication-bypass-on-airbnb-acquisition-using-weird-1-char-open-redirect/</link>
		
		<dc:creator><![CDATA[Sp1d3R]]></dc:creator>
		<pubDate>Wed, 10 Jul 2019 13:16:35 +0000</pubDate>
				<category><![CDATA[Writeups]]></category>
		<guid isPermaLink="false">https://xpoc.pro/?p=190</guid>

					<description><![CDATA[This finding was a part of Hack the World 2017 event. TL;DR: it was possible to leak Facebook access_token to the external domain, and authorize on the site on behalf of the user using this token.]]></description>
		
		
		
			</item>
		<item>
		<title>Improving your success as  bug bounty hunter</title>
		<link>/improving-your-success-as-security-researcher-and-bug-bounty-hunter/</link>
		
		<dc:creator><![CDATA[Sp1d3R]]></dc:creator>
		<pubDate>Tue, 28 Nov 2017 13:21:14 +0000</pubDate>
				<category><![CDATA[Guides]]></category>
		<guid isPermaLink="false">https://xpoc.pro/?p=177</guid>

					<description><![CDATA[The big count of the bug bounty hunters usually does not care about their report quality. I was no exception. I started my work on the HackerOne platform at the end of the October 2016. Actually, I registered there in the May 2016, but was busy with startup and forgot about it (I worked as <a class="read-more" href="/improving-your-success-as-security-researcher-and-bug-bounty-hunter/">&#8230;&#160;<span class="meta-nav">&#8594;</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>How the bug on the CloudFlare «Always Online» page could lead to Unvalidated Redirect on the any site including hacker.one</title>
		<link>/how-the-bug-on-the-cloudflare-always-online-page-could-lead-to-unvalidated-redirect-on-the-any-site-including-hackerone/</link>
		
		<dc:creator><![CDATA[Sp1d3R]]></dc:creator>
		<pubDate>Thu, 23 Nov 2017 14:53:37 +0000</pubDate>
				<category><![CDATA[Writeups]]></category>
		<guid isPermaLink="false">https://xpoc.pro/?p=157</guid>

					<description><![CDATA[Hello. This finding was closely related to the https://hackerone.com/reports/214620 , but used the flaw in the URL parsing on the CloudFlare error page. Maybe this finding does not worth a blog post, but it was not disclosed, and I need some practice in the blogging:) So I found this curious bug when researching domain hacker.one When the <a class="read-more" href="/how-the-bug-on-the-cloudflare-always-online-page-could-lead-to-unvalidated-redirect-on-the-any-site-including-hackerone/">&#8230;&#160;<span class="meta-nav">&#8594;</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>One more way to exploit a Stored Self-XSS</title>
		<link>/turning-stored-self-xss/</link>
		
		<dc:creator><![CDATA[Sp1d3R]]></dc:creator>
		<pubDate>Tue, 14 Nov 2017 16:43:58 +0000</pubDate>
				<category><![CDATA[Writeups]]></category>
		<guid isPermaLink="false">https://xpoc.pro/?p=101</guid>

					<description><![CDATA[Self-XSS is better than no XSS. ©Captain Obvious. Hello. In this blog post, I will describe one more way to exploit the Self-XSS. Usually, this type of XSS is underestimated because of self-exploitation only. However, there are a lot of ways to convert it to the good XSS. Things which can be useful in chains: login <a class="read-more" href="/turning-stored-self-xss/">&#8230;&#160;<span class="meta-nav">&#8594;</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>How Access Control issue in the Facebook game turned me from the dev to the security researcher</title>
		<link>/how-idor-in-the-facebook-game-turned-me-from-the-dev-to-the-security-researcher/</link>
		
		<dc:creator><![CDATA[Sp1d3R]]></dc:creator>
		<pubDate>Sat, 11 Nov 2017 16:45:22 +0000</pubDate>
				<category><![CDATA[Writeups]]></category>
		<guid isPermaLink="false">https://xpoc.pro/?p=56</guid>

					<description><![CDATA[Hello. Since it is my first blog post, I&#8217;ll start my stories from the beginning &#8211; from the first bug, which made me seriously think about infosec career. It was the May 2016, and I played with friends in the online game, located on the https://apps.facebook.com/xxxxxxx (I can&#8217;t disclose game title, but I will try <a class="read-more" href="/how-idor-in-the-facebook-game-turned-me-from-the-dev-to-the-security-researcher/">&#8230;&#160;<span class="meta-nav">&#8594;</span></a>]]></description>
		
		
		
			</item>
	</channel>
</rss>
