appsec.fyi · Sources

labs.detectify.com

9 curated AppSec resources from labs.detectify.com across 8 topics on appsec.fyi.

labs.detectify.com

Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2025-08-14.

Date Added Resource Excerpt
2025-08-14 202510 Types of Web Vulnerabilities that are Often Missed - Detectify LabsSSRFXSSXXELibrary of 10 web vulnerabilities often missed by security testers, including HTTP/2 Smuggling via request desyncs and XXE via Office Open XML parsers. It also details SSRF via XSS in PDF generators and XSS via SVG files, providing techniques and examples for exploitation and detection.
2025-08-14 2025SSRF vulnerabilities and where to find themSSRFGuide to Server-Side Request Forgery (SSRF) vulnerabilities, explaining how they occur when applications fetch user-supplied URLs. It details common locations such as webhook integrations and file imports, and highlights parameter names often targeted, referencing the HUNT Burp Suite extension. The guide also covers bypassing protections using techniques like DNS rebinding, HTTP redirects, and non-standard IP notations, and mentions the DEF CON talk on exploiting SSRF through PDF generators.
2025-08-14 2025https://labs.detectify.com/2022/09/23/ssrf-vulns-and-where-to-find-them/SSRFGuide to Server-Side Request Forgery (SSRF) vulnerabilities, detailing their nature, common discovery locations like webhook integrations and file imports, and effective bypass techniques. The guide highlights tools such as the HUNT Burp Suite extension and discusses exploitation methods including DNS rebinding, HTTP redirects, and non-standard IP notations, referencing work by Nahamsec and Cody Brocious concerning PDF generators. It differentiates between blind, partial-blind, and non-blind SSRF, and provides common parameter names to look for during testing.
2024-10-17 202410 Types of Web Vulnerabilities that are Often Missed - Labs DetectifyBug BountySSRFSurvey of web vulnerabilities often missed, including HTTP/2 smuggling exploiting header desynchronization and XXE via Office Open XML parsers by crafting malicious OOXML files. It also covers SSRF through XSS in PDF generators, potentially leveraging headless browsers to access internal resources like AWS metadata, and XSS via SVG file uploads.
2023-08-11 2023How To Hack Web Applications in 2022: Part 1Bug BountyLibrary for web application security testing that details techniques for identifying and exploiting vulnerabilities like SQL Injection, Code Injection, XSS, Defacement, Cookie poisoning, and Remote Code Execution. It outlines the setup process using Burp Suite and discusses common web application architectures, including Single Page Applications and Traditional Web Applications, referencing the OWASP Top 10 as a standard vulnerability guide.
2021-12-06 2021Hakluke: Creating the Perfect Bug Bounty AutomationBug BountyLibrary for building bug bounty automation frameworks, detailing iterations from simple Bash scripts to a Django application utilizing PostgreSQL and RabbitMQ. This framework enables efficient data storage, modular vulnerability detection through custom management commands, and horizontal scaling with worker instances, inspired by the development of tools like Interlace for concurrent task execution.
2021-10-26 2021How to set up Docker for Varnish HTTP/2 request smugglingAPI SecWalkthrough of setting up a Docker environment to test HTTP/2 request smuggling, focusing on CVE-2021-36740. This technique exploits how H2-compatible proxies rewrite HTTP/2 requests to HTTP/1.1, specifically when Varnish cache improperly handles the `Content-Length` header during this conversion, allowing malicious requests to be prepended to subsequent legitimate ones. The setup involves Varnish, Hitch for TLS termination, and origin servers.
2021-10-04 202110 Types of Web Vulnerabilities that are Often MissedBug BountyIDORSQLiSSRFXSSLibrary of web vulnerabilities often overlooked by security testers, including HTTP/2 smuggling, XXE via Office Open XML parsers, SSRF via XSS in PDF generators, and XSS via SVG files. This resource delves into obscure bug classes and less common approaches to traditional vulnerabilities, providing insights for bug bounty hunters and security professionals. It references techniques and tools like `http2smugl` and discussions from Defcon presentations.
2021-08-30 2021Hakluke's huge list of resources for beginner hackersBug BountyReconLibrary: This catalog entry lists curated resources for beginner hackers, covering bug bounty hunting and penetration testing. It highlights platforms like Pentesterlab, Portswigger labs, Tryhackme, Hackthebox, Kontra, Hacker101.com, and Vulnhub for hands-on learning. The entry also recommends YouTube channels and Twitter accounts from established cybersecurity professionals, and lists blogs and write-up platforms such as Hackerone Hacktivity, Crowdstream, and Intigriti for exploring disclosed vulnerabilities and methodologies.