<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Dock12 - Sorint.Lab</title>
    <link>https://dock12.sorint.com/</link>
    <description>Recent content on Dock12 - Sorint.Lab</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 08 Apr 2025 08:14:54 +0000</lastBuildDate><atom:link href="https://dock12.sorint.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>3 Ways In: Exploiting WordPress Plugins via File Upload and Deserialization</title>
      <link>https://dock12.sorint.com/post/report/</link>
      <pubDate>Tue, 08 Apr 2025 08:14:54 +0000</pubDate>
      
      <guid>https://dock12.sorint.com/post/report/</guid>
      <description>In this post, I break down three real-world vulnerabilities found in WordPress plugins — from unsafe deserialization to arbitrary file upload — and show how they can lead to full compromise.Includes analysis, PoCs, and exploitation details.</description>
    </item>
    
    <item>
      <title>Exploring UTF-16 and its oddities in JavaScript</title>
      <link>https://dock12.sorint.com/post/javascript-utf16/</link>
      <pubDate>Wed, 20 Nov 2024 15:35:32 +0100</pubDate>
      
      <guid>https://dock12.sorint.com/post/javascript-utf16/</guid>
      <description>Uncovering the unexpected behaviors of JavaScript strings and the challenges posed by UTF-16 encoding</description>
    </item>
    
    <item>
      <title>Why Cross-Site Request Forgery is not dead</title>
      <link>https://dock12.sorint.com/post/cspt-csrf/</link>
      <pubDate>Mon, 29 Jul 2024 12:49:54 +0100</pubDate>
      
      <guid>https://dock12.sorint.com/post/cspt-csrf/</guid>
      <description>While modern defenses have made CSRF vulnerabilities more challenging to exploit, emerging techniques still pose significant threats</description>
    </item>
    
    <item>
      <title>Common OAuth2 misconfigurations and vulnerabilities</title>
      <link>https://dock12.sorint.com/post/oauth2-vulnerabilities/</link>
      <pubDate>Mon, 27 May 2024 15:10:23 +0100</pubDate>
      
      <guid>https://dock12.sorint.com/post/oauth2-vulnerabilities/</guid>
      <description>Let&amp;rsquo;s take a look at the most common OAuth2 misconfigurations that can lead to vulnerabilities</description>
    </item>
    
    <item>
      <title>Protocol impersonation attacks with QUIC</title>
      <link>https://dock12.sorint.com/post/quic-csrf/</link>
      <pubDate>Fri, 15 Mar 2024 11:23:21 +0100</pubDate>
      
      <guid>https://dock12.sorint.com/post/quic-csrf/</guid>
      <description>Exploring security risks in a &amp;lsquo;Secure by Design&amp;rsquo; and modern transport protocol</description>
    </item>
    
    <item>
      <title>Approaching R2R from an RE point of view</title>
      <link>https://dock12.sorint.com/post/ready-to-run/</link>
      <pubDate>Mon, 29 Jan 2024 17:20:37 +0100</pubDate>
      
      <guid>https://dock12.sorint.com/post/ready-to-run/</guid>
      <description>Legit features often turn into something unexpected: an Insomni&amp;rsquo;hack Teaser 2024 challenge writeup</description>
    </item>
    
    <item>
      <title>Is it possible to break RSA? (Part 1)</title>
      <link>https://dock12.sorint.com/post/breaking-rsa/</link>
      <pubDate>Wed, 20 Dec 2023 11:13:37 +0100</pubDate>
      
      <guid>https://dock12.sorint.com/post/breaking-rsa/</guid>
      <description>RSA is an old but still secure public-key cryptosystem. However we need to know how it works to avoid mistakes that could introduce vulnerabilities..</description>
    </item>
    
    <item>
      <title>Madame De Maintenon’s Cryptographic Pursuit – Unmasking the Traitors</title>
      <link>https://dock12.sorint.com/post/unmasking-the-traitors/</link>
      <pubDate>Wed, 20 Dec 2023 10:13:37 +0100</pubDate>
      
      <guid>https://dock12.sorint.com/post/unmasking-the-traitors/</guid>
      <description>Inside the Hex-Rays CTF Challenge and the &amp;ldquo;mysteries&amp;rdquo; of RSA</description>
    </item>
    
    <item>
      <title>A closer look to Single-Packet attack</title>
      <link>https://dock12.sorint.com/post/a-closer-look-to-single-packet-attack/</link>
      <pubDate>Mon, 23 Oct 2023 16:14:32 +0200</pubDate>
      
      <guid>https://dock12.sorint.com/post/a-closer-look-to-single-packet-attack/</guid>
      <description>How HTTP/2 capabilities can be used to uncover Web race conditions</description>
    </item>
    
    <item>
      <title>Writing your first custom Semgrep rule</title>
      <link>https://dock12.sorint.com/post/writing-your-first-custom-semgrep-rule/</link>
      <pubDate>Thu, 27 Jul 2023 14:47:23 +0200</pubDate>
      
      <guid>https://dock12.sorint.com/post/writing-your-first-custom-semgrep-rule/</guid>
      <description>Using semgrep to write custom SAST rules and prevent vulnerabilities in your code</description>
    </item>
    
    <item>
      <title>How I met JavaScript Reflect (thanks to playing CTF)</title>
      <link>https://dock12.sorint.com/post/javascript-reflection/</link>
      <pubDate>Tue, 30 May 2023 10:09:10 +0200</pubDate>
      
      <guid>https://dock12.sorint.com/post/javascript-reflection/</guid>
      <description>Playing CTF competitions to learn new stuff and discover hidden and powerful features</description>
    </item>
    
    <item>
      <title>An unpredictable XSS story</title>
      <link>https://dock12.sorint.com/post/an-unpredictable-xss-story/</link>
      <pubDate>Mon, 08 May 2023 17:08:51 +0200</pubDate>
      
      <guid>https://dock12.sorint.com/post/an-unpredictable-xss-story/</guid>
      <description>How an image compression feature can lead to XSS</description>
    </item>
    
    <item>
      <title>Writeup: Speed-Rev Bots (HackPack CTF 2023)</title>
      <link>https://dock12.sorint.com/post/speed-rev-bots/</link>
      <pubDate>Wed, 26 Apr 2023 09:44:47 +0100</pubDate>
      
      <guid>https://dock12.sorint.com/post/speed-rev-bots/</guid>
      <description>A CTF writeup about solving 6 challenges in 5 minutes</description>
    </item>
    
    <item>
      <title>Java insecure deserialization 101</title>
      <link>https://dock12.sorint.com/post/java-insecure-deserialization-101/</link>
      <pubDate>Wed, 19 Apr 2023 12:49:53 +0200</pubDate>
      
      <guid>https://dock12.sorint.com/post/java-insecure-deserialization-101/</guid>
      <description>A basic introduction to Java insecure deserialization and and how attackers can exploit this vulnerability to get RCE</description>
    </item>
    
    <item>
      <title>Java Native Interface and its hidden threats</title>
      <link>https://dock12.sorint.com/post/jni-security-risks/</link>
      <pubDate>Mon, 13 Mar 2023 10:53:00 +0100</pubDate>
      
      <guid>https://dock12.sorint.com/post/jni-security-risks/</guid>
      <description>How interoperation between the JVM and native code can create security issues</description>
    </item>
    
    <item>
      <title>Thoughts about Yara rules</title>
      <link>https://dock12.sorint.com/post/yara-rule-thoughts/</link>
      <pubDate>Mon, 06 Feb 2023 13:35:47 +0100</pubDate>
      
      <guid>https://dock12.sorint.com/post/yara-rule-thoughts/</guid>
      <description>I decided to create a Yara rule to detect a malware: some things you may find useful about the process</description>
    </item>
    
    <item>
      <title>JavaScript prototype chain and security risks</title>
      <link>https://dock12.sorint.com/post/js-prototype-pollution/</link>
      <pubDate>Fri, 03 Feb 2023 15:53:19 +0100</pubDate>
      
      <guid>https://dock12.sorint.com/post/js-prototype-pollution/</guid>
      <description>What is a prototype in JavaScript and how this useful feature can lead to security risks</description>
    </item>
    
  </channel>
</rss>
