The Hacker Blog //thehackerblog.com A Hacker's Blog of Unintended Use and Insomnia. Wed, 13 Jun 2018 15:19:30 +0000 en-US hourly 1 http://wordpress.org/?v=4.2.4 Kicking the Rims – A Guide for Securely Writing and Auditing Chrome Extensions //thehackerblog.com/kicking-the-rims-a-guide-for-securely-writing-and-auditing-chrome-extensions/ //thehackerblog.com/kicking-the-rims-a-guide-for-securely-writing-and-auditing-chrome-extensions/#comments Wed, 13 Jun 2018 06:48:25 +0000 //thehackerblog.com/?p=2230 Read More]]> //thehackerblog.com/kicking-the-rims-a-guide-for-securely-writing-and-auditing-chrome-extensions/feed/ 0 Steam, Fire, and Paste – A Story of UXSS via DOM-XSS & Clickjacking in Steam Inventory Helper //thehackerblog.com/steam-fire-and-paste-a-story-of-uxss-via-dom-xss-clickjacking-in-steam-inventory-helper/ //thehackerblog.com/steam-fire-and-paste-a-story-of-uxss-via-dom-xss-clickjacking-in-steam-inventory-helper/#comments Fri, 08 Jun 2018 02:24:01 +0000 //thehackerblog.com/?p=2192 Read More]]> //thehackerblog.com/steam-fire-and-paste-a-story-of-uxss-via-dom-xss-clickjacking-in-steam-inventory-helper/feed/ 0 Reading Your Emails With A Read&Write Chrome Extension Same Origin Policy Bypass (~8 Million Users Affected) //thehackerblog.com/reading-your-emails-with-a-readwrite-chrome-extension-same-origin-policy-bypass-8-million-users-affected/ //thehackerblog.com/reading-your-emails-with-a-readwrite-chrome-extension-same-origin-policy-bypass-8-million-users-affected/#comments Tue, 05 Jun 2018 06:59:47 +0000 //thehackerblog.com/?p=2138 Read More]]> //thehackerblog.com/reading-your-emails-with-a-readwrite-chrome-extension-same-origin-policy-bypass-8-million-users-affected/feed/ 0 ZenMate VPN Browser Extension Deanonymization & Hijacking Vulnerability (3.5 Million Affected Users) //thehackerblog.com/zenmate-vpn-browser-extension-deanonymization-hijacking-vulnerability-3-5-million-affected-users/ //thehackerblog.com/zenmate-vpn-browser-extension-deanonymization-hijacking-vulnerability-3-5-million-affected-users/#comments Tue, 29 May 2018 15:31:57 +0000 //thehackerblog.com/?p=2088 Read More]]> //thehackerblog.com/zenmate-vpn-browser-extension-deanonymization-hijacking-vulnerability-3-5-million-affected-users/feed/ 0 “I too like to live dangerously”, Accidentally Finding RCE in Signal Desktop via HTML Injection in Quoted Replies //thehackerblog.com/i-too-like-to-live-dangerously-accidentally-finding-rce-in-signal-desktop-via-html-injection-in-quoted-replies/ //thehackerblog.com/i-too-like-to-live-dangerously-accidentally-finding-rce-in-signal-desktop-via-html-injection-in-quoted-replies/#comments Wed, 16 May 2018 13:33:23 +0000 //thehackerblog.com/?p=2053 Read More]]> //thehackerblog.com/i-too-like-to-live-dangerously-accidentally-finding-rce-in-signal-desktop-via-html-injection-in-quoted-replies/feed/ 0 The .io Error – Taking Control of All .io Domains With a Targeted Registration //thehackerblog.com/the-io-error-taking-control-of-all-io-domains-with-a-targeted-registration/ //thehackerblog.com/the-io-error-taking-control-of-all-io-domains-with-a-targeted-registration/#comments Mon, 10 Jul 2017 15:21:08 +0000 //thehackerblog.com/?p=2027 Read More]]> //thehackerblog.com/the-io-error-taking-control-of-all-io-domains-with-a-targeted-registration/feed/ 0 The Journey to Hijacking a Country’s TLD – The Hidden Risks of Domain Extensions //thehackerblog.com/the-journey-to-hijacking-a-countrys-tld-the-hidden-risks-of-domain-extensions/ //thehackerblog.com/the-journey-to-hijacking-a-countrys-tld-the-hidden-risks-of-domain-extensions/#comments Sun, 04 Jun 2017 10:59:13 +0000 //thehackerblog.com/?p=1947 Read More]]> //thehackerblog.com/the-journey-to-hijacking-a-countrys-tld-the-hidden-risks-of-domain-extensions/feed/ 0 Hacking Guatemala’s DNS – Spying on Active Directory Users By Exploiting a TLD Misconfiguration //thehackerblog.com/hacking-guatemalas-dns-spying-on-active-directory-users-by-exploiting-a-tld-misconfiguration/ //thehackerblog.com/hacking-guatemalas-dns-spying-on-active-directory-users-by-exploiting-a-tld-misconfiguration/#comments Tue, 31 Jan 2017 07:54:10 +0000 //thehackerblog.com/?p=1881 Read More]]> //thehackerblog.com/hacking-guatemalas-dns-spying-on-active-directory-users-by-exploiting-a-tld-misconfiguration/feed/ 0 Respect My Authority – Hijacking Broken Nameservers to Compromise Your Target //thehackerblog.com/respect-my-authority-hijacking-broken-nameservers-to-compromise-your-target/ //thehackerblog.com/respect-my-authority-hijacking-broken-nameservers-to-compromise-your-target/#comments Thu, 12 Jan 2017 09:26:00 +0000 //thehackerblog.com/?p=1811 Read More]]> //thehackerblog.com/respect-my-authority-hijacking-broken-nameservers-to-compromise-your-target/feed/ 0 The Orphaned Internet – Taking Over 120K Domains via a DNS Vulnerability in AWS, Google Cloud, Rackspace and Digital Ocean //thehackerblog.com/the-orphaned-internet-taking-over-120k-domains-via-a-dns-vulnerability-in-aws-google-cloud-rackspace-and-digital-ocean/ //thehackerblog.com/the-orphaned-internet-taking-over-120k-domains-via-a-dns-vulnerability-in-aws-google-cloud-rackspace-and-digital-ocean/#comments Mon, 05 Dec 2016 16:30:18 +0000 //thehackerblog.com/?p=1741 Read More]]> //thehackerblog.com/the-orphaned-internet-taking-over-120k-domains-via-a-dns-vulnerability-in-aws-google-cloud-rackspace-and-digital-ocean/feed/ 0