Kamil Vavra | @vavkamil

Offensive Web Application Security | Ethical Hacking | Security Research

📖Blog 📢Talks 💰Bug bounty 🕵️Whoami 📩Contact | 💻GitHub 🏆LinkedIn

vavkamil@localhost:~/Blog$

Mostly posts about web application security, ethical hacking, and security research:



Categories



AEC SafeWeb CTF Write-up

AEC SafeWeb CTF Write-up

Ethical hacking - Responsible disclosure

| 16 minutes to read


AEC Hacking Competition is a famous Czech CTF with 15 web application security challenges. It used to work like this: If you solved at least 12 challenges, you were invited for the penetration tester interview.





Bookmarklet hijacking

Bookmarklet hijacking

Security research - Tools

| 4 minutes to read


I noticed an exciting link shared on Hacker News titled “Wait, what’s a bookmarklet?”. I have been using them for a long time, and while reading that discussion, it was nice to see people sharing useful ones they use to make their everyday tasks easier.





WordPress Plugin Confusion: How an update can get you pwned

WordPress Plugin Confusion: How an update can get you pwned

Bug bounty - Responsible disclosure

| 22 minutes to read


tl;dr: Like the novel “Dependency Confusion” supply chain attack, it is possible to take over internally developed WordPress plugins unclaimed on the wordpress.org registry. Updating the plugin might result in the RCE or installing a PHP backdoor. You can use wp_update_confusion.py to scan for potential targets. To protect your website, please read this announcement.









Exploiting remote DoS vulnerability in my not-so-smart TV

Exploiting remote DoS vulnerability in my not-so-smart TV

Ethical hacking - Responsible disclosure

| 8 minutes to read


tl;dr: I found a remotely exploitable DoS vulnerability in my “smart” TV in less than two hours after unboxing. I have released full details, including a 0-day PoC exploit.





WP GDPR Compliance <= 1.5.5 - Unauthenticated XSS

WP GDPR Compliance <= 1.5.5 - Unauthenticated XSS

Ethical hacking - Responsible disclosure

| 7 minutes to read


tl;dr: The GDPR Compliance <= 1.5.5 plugin allowed unauthenticated users to exploit Stored Cross-Site Scripting (XSS) in the administration panel, which might lead to the privilege escalation. That was due to clients’ IP Addresses reflected in the plugin’s dashboard without being correctly validated or escaped.





XSSworm.dev ~ Self-replication contest [write-up]

XSSworm.dev ~ Self-replication contest [write-up]

Security research - Tools

| 9 minutes to read


tl;dr: I created “CTF” style challenge for our OWASP Czech Chapter Virtual Meeting. The goal was to write an XSS worm and score points by infecting 1k virtual users. You can find the source code here and read the details in this post.





Hacking Node.js legacy URL API

Hacking Node.js legacy URL API

Ethical hacking - Security research - Bug bounty

| 8 minutes to read


Our security engineers ensure the highest possible safety of our services. Their weapon of choice? Penetration testing. It is a simulation of a cyber-attack conducted by authorized developers to discover and penetrate any security vulnerabilities in the system/app/service the team is developing. Other proactive steps include secure code review, dependency scanning, SAST, and asset monitoring.





All-in-One WP Migration <=7.14 Arbitrary Backup Download

All-in-One WP Migration <=7.14 Arbitrary Backup Download

Ethical hacking - Responsible disclosure

| 3 minutes to read


A long time ago, I made a stupid decision to use WordPress for this blog about offensive website security. Since then, I learned a lot. I will be releasing a plugin to defend against XML-RPC attacks and guide how to generate a static HTML site in upcoming weeks.





Hack-back: the tale of embarrassing phishing campaign

Hack-back: the tale of embarrassing phishing campaign

Ethical hacking - Security research

| 3 minutes to read


Today was a good day, I received a phishing email to by Protonmail address. I don't have a copy of the email, as I reported it and later deleted it as spam. Thankfully, other security research took screenshots yesterday:













Serverless Blind XSS hunter with Cloudflare Workers

Serverless Blind XSS hunter with Cloudflare Workers

Security research - Tools - Bug bounty

| 4 minutes to read


If you are not familiar with XSS Hunter by @IAmMandatory, it's an awesome tool for penetration testers and bug bounty hunters that allows easily hunt for blind XSS vulnerabilities. It's open-source with a ton of features. You can use the SaaS version, deploy it yourself or even go serverless! You should absolutely give it a try :)






Archive & external old stuff