TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Web hacking techniques of 2021

567 pointsby adrianomartinsover 3 years ago

15 comments

badrabbitover 3 years ago
This guy&#x27;s work always impresses me. He had a nice Blackhat brief as well.<p>This list is great and all for redteamers but as a defender, I would like to know if any actual threat actors used these techniques even after publication. Even with all the secret&#x2F;private and public threat intel I am aware of, none of them register. Not knocking down on threat research, I am honestly curious because I can&#x27;t tell if I should be on the look out for any real threat actors using these techniques.
评论 #30290053 未加载
scanrover 3 years ago
The work on exploiting prototype pollution was excellent <a href="https:&#x2F;&#x2F;blog.s1r1us.ninja&#x2F;research&#x2F;PP" rel="nofollow">https:&#x2F;&#x2F;blog.s1r1us.ninja&#x2F;research&#x2F;PP</a><p>I didn’t know about the --disable-proto option in node or the Document Policy proposal for dealing with it.<p>Amazing that 80% of nested query parameter parsers were susceptible to prototype pollution.
clarnaskirqover 3 years ago
As a web programmer, for whom the majority of this article is not only new, but difficult to comprehend, it makes me yearn to improve my web security knowledge. Any pointers?
评论 #30292198 未加载
评论 #30293208 未加载
评论 #30293648 未加载
评论 #30291996 未加载
losthobbiesover 3 years ago
The dependency confusion article on Medium was a great read.
评论 #30285133 未加载
评论 #30290245 未加载
评论 #30294136 未加载
评论 #30292885 未加载
formerly_provenover 3 years ago
Five out of ten new techniques are langsec, which makes them inherently difficult to fix, yet we keep using unreasonably complex languages for protocols and keep stapling on more complexity, resulting in formally assured insecurity.
评论 #30284938 未加载
furstenheimover 3 years ago
It got me thinking, is client side rendering intrinsically safer than SSR.<p>SQL queries with params are safer because data and code flow separately. Similarly, if you query backend for data and then do textContent = response, that cannot do xss, right?
评论 #30286639 未加载
评论 #30285568 未加载
评论 #30286843 未加载
评论 #30285080 未加载
hbnover 3 years ago
Not super on topic, but every time this site is linked, I never properly read the URL correctly. My brain immediately thinks the space is between the &#x27;s&#x27; and &#x27;w&#x27;
评论 #30286340 未加载
评论 #30286267 未加载
adrianomartinsover 3 years ago
Interesting community built list of the top 10 web hacking vulnerabilities used in 2021. If you&#x27;re making a web product you might want your team to quickly run over these.
评论 #30284799 未加载
fendy3002over 3 years ago
Man the JSON inconsistency one is creative. I know it&#x27;s not consistent implementation across languages, but I don&#x27;t know it can be used to such attacks.
评论 #30284875 未加载
ackbar03over 3 years ago
Anyone here that works on these kind of deep-dive type of security research? Can you give a TLDR of how do you usually set everything up to find these results?<p>As in, do you set up some sort of test environment&#x2F;website with full debug logs and take if one step at a time from there? If so, how to you ensure that it is realistic and relevant to real world use since real-world architecture might differ from a setup that worked in your experiments?<p>I ask this because I used to do some bug bounties and it consisted of a lot of painful trial and error. I can&#x27;t imagine anything new and profound can be found that way.<p>(PS in case it isn&#x27;t obvious I didn&#x27;t open up the research links and read in detail, hence a tldr)
评论 #30287498 未加载
bawolffover 3 years ago
Kind of feels a little repetitive to have request smugguling on the list 3 different times.
icare_1erover 3 years ago
It baffles me how convoluted and complex the webapp attacks have become over the past few years.<p>I think this is an effect of bug-bounty hunting, which has pretty much opened the research on those topics to a massive community.
ooedemisover 3 years ago
What about GWT-Google Web Toolkit its actually not so many updated and under top news but the idea is implement in a prooven language java both frontend and backend
TheAdamistover 3 years ago
The hn title needs updating as it&#x27;s misleading, even if it reflects the title on the website. The first sentence even clarifies it&#x27;s only new techniques.<p>&quot;Welcome to the Top 10 (new) Web Hacking Techniques of 2021, the latest iteration of our annual community-powered effort to identify the most significant web security research released in the last year&quot;.<p>The top web hacking techniques used and the top new ones I would expect to be very different lists.
Agamusover 3 years ago
I&#x27;m not an expert here, but truly interested to hear responses to this question.<p>To say that 1+1=2 is &quot;true&quot;, does that not require a corollary in &quot;reality&quot; to something fundamental that can be called a &quot;one&quot; object? I believe this is called mathematical constructivism.<p>Imagine, hypothetically, that we cannot identify something that is physically fundamental and individual. My question is whether any mathematics in that scenario could be considered &quot;true&quot; without such constructivism, in other words, without a physical correspondence to an unquestionably, physically fundamental &quot;one&quot; object.
评论 #30296985 未加载
评论 #30289972 未加载