Denis Makrushin
  • Blog
  • Research
Denis Makrushin
  • Academynew
  • About
Blog

Bug Hunting Village Summary

by Denis Makrushin June 7, 2021

Quick summary of Bug Hunting Village, the first time we organized offline:

  • 12 talks and workshops focused on vulnerability research and bug bounty;
  • highest payouts during two days of conference by our partners (thanks to Mail.ru Group, VK.com, Азбука Вкуса, Avito, iSimpleLab);
  • prizes for most active bug hunters (thanks to PHDays organizers and Timur Yunusov);
  • communication in our Chat and knowledge sharing in Telegram-channel, and continuous movement to the next offline event.
June 7, 2021
TwitterLinkedinVKTelegram
Blog

Bug Hunting Hub goes offline with Bug Hunting Village

by Denis Makrushin May 8, 2021

Organised within a separate section at PHDays for the first time, leading security researchers and bug hunters will share the results of their work, and owners of bug bounty programs can attract bug hunters by making an announcement. During the event, our sponsors and partners will announce the highest bounties for their vulnerability disclosure programs, and the most active bug hunters will be additionally awarded by organisers.

Submit your talk, workshop or just register yourself to participate here (for Russian-based submissions).

May 8, 2021
TwitterLinkedinVKTelegram
Research

JavaScript prototype pollution: practice of finding and exploitation

by Denis Makrushin April 27, 2021

https://infosecwriteups.com/javascript-prototype-pollution-practice-of-finding-and-exploitation-f97284333b2

Finally, the English version of “JavaScript prototype pollution: practice of finding and exploitation” article is prepared. Using the techniques Nikita Stupin discovered CVE-2020–28460 in multi-ini parser and a vulnerability in the merge-deep package. With the first one, everything went smoothly, but with the second one, a funny situation came out: after sending the report, the maintainer did not get in touch for a long time, and as a result, GitHub Security Lab found the same vulnerability, managed to reach the maintainer earlier and registered it (GHSL-2020–160). All details related to these vulnerabilities, discovery and exploitation techniques, and recommendations on how to protect your applications are collected in the article.

April 27, 2021
TwitterLinkedinVKTelegram
Load More Posts

Join Telegram Channel

  • Twitter
  • Linkedin
  • Vk
  • Telegram

@ 2009. Denis Makrushin


Back To Top
Denis Makrushin
  • Blog
  • Research
Denis Makrushin
  • Academynew
  • About