<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"><channel><description>Zak Fedotkin&#xA;All thought are mine and mine alone</description><link>https://bsky.app/profile/zakfedotkin.bsky.social</link><title>@zakfedotkin.bsky.social - d4d</title><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3m7ieyaslvc2z</link><description>The Fragile Lock: Novel Bypasses for SAML Authentication will premiere this Wednesday at 10:20 at Black Hat Europe! I&#39;ll show you how to chain XML parser quirks to achieve complete authentication bypasses on multiple popular libraries #BHEU @blackhatevents.bsky.social</description><pubDate>08 Dec 2025 15:49 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3m7ieyaslvc2z</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3m62vagikgs2b</link><description>I am very proud of this h1 achievement!</description><pubDate>20 Nov 2025 13:37 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3m62vagikgs2b</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3m2mf2utytk2x</link><description>I’m excited to announce that I’ll be presenting The Fragile Lock: Novel Bypasses for SAML Authentication at Black Hat Europe! In this talk, I’ll show how I was able to continuously bypass security patches to achieve complete auth bypass for major libraries. #BHEU @blackhatevents.bsky.social</description><pubDate>07 Oct 2025 14:55 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3m2mf2utytk2x</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lyzufuwsds2c</link><description>Dive into WebSocket Turbo Intruder 2.0 - fuzz at scale, automate complex multi-step attacks, and exploit faster.&#xA;The blog post is live! Read it here:&#xA;https://portswigger.net/research/websocket-turbo-intruder-nbsp-unearthing-the-websocket-goldmine</description><pubDate>17 Sep 2025 12:44 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lyzufuwsds2c</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lyl37pksrk24</link><description>WebSocket security testing is so painful that this ever -expanding attack surface is largely overlooked. Learn how to dive where others fear to tread with WebSocket Turbo Intruder.&#xA;Join me live on Sept 17 at 4PM (GMT+1) &#xA;&#xA;https://discord.gg/portswigger?event=1410640417640415312</description><pubDate>11 Sep 2025 15:36 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lyl37pksrk24</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lxwv5pbpwc2l</link><description>We&#39;ve just published a novel technique to bypass the __Host and __Secure cookie flags, to achieve maximum impact for your cookie injection findings: https://portswigger.net/research/cookie-chaos-how-to-bypass-host-and-secure-cookie-prefixes</description><pubDate>03 Sep 2025 14:54 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lxwv5pbpwc2l</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lus6st4xx223</link><description>I love discrepancies so much that I decided to introduce them to my nickname too @d4d89704243.bsky.social → &#xA;@zakfedotkin.bsky.social&#xA; &#xA;Because why be consistent when you can keep people guessing?</description><pubDate>25 Jul 2025 13:48 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lus6st4xx223</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lsjbqumzck2r</link><description>Thrilled to announce: I’ll be presenting a major new version of WebSocket Turbo Intruder at Black Hat Arsenal 2025! This open-source toolkit makes high-speed, advanced WebSocket attacks practical and painless.</description><pubDate>26 Jun 2025 13:56 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lsjbqumzck2r</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lqahlofwc22n</link><description>Active Scan++ just got sharper - we’ve added new checks for OS command injection, powered by our latest ASCII Control Characters research. Install via Extensions -&gt; BApp Store</description><pubDate>28 May 2025 14:56 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lqahlofwc22n</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lolk6p3dik2y</link><description>I&#39;m thrilled to announce my talk &#34;Cookie Chaos: Exploiting Parser Discrepancies&#34; at @steelcon.info ! Catch it live in Sheffield, or later on YoutTube. Check out the full abstract here: https://portswigger.net/research/talks?talkId=30&#xA;https://portswigger.net/research/talks?talkId=30@steelcon.info</description><pubDate>07 May 2025 13:51 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lolk6p3dik2y</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lnzt4tfcm22x</link><description>Think you’ve seen every OS command injection trick? &#xA;Think again, read our latest blog post!&#xA;Link in the comments👇</description><pubDate>30 Apr 2025 12:44 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lnzt4tfcm22x</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lknwqx5wls2y</link><description>I’m excited to introduce Namespace Confusion, a novel attack discovered during Gareth&#39;s and mySAML Roulette: The Hacker Always Wins research. We uncovered a brutal attack on XML signature validation that destroys authentication in Ruby-SAML!&#xA;&#xA;[contains quote post or other embedded content]</description><pubDate>18 Mar 2025 15:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lknwqx5wls2y</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3ljn3uzv7u22z</link><description>Today&#39;s update to the URL Validation Bypass Cheat Sheet includes a new trick: bypassing domain allow lists using a full URL in the query, submitted by Alexis Hapiot!&#xA;&#xA;This idea came after our previous update from @dyak0xdb, which sparked great discussions! More updates are live. Link in the reply 👇</description><pubDate>05 Mar 2025 13:35 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3ljn3uzv7u22z</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lhiqvfx2mk2w</link><description>We&#39;ve updated our URL validation bypass cheat sheet with this shiny Domain allow list bypass payload contributed by dyak0xdb!</description><pubDate>06 Feb 2025 09:17 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lhiqvfx2mk2w</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lgdnf6nb6c2g</link><description>Hot out of the oven! The Cookie Sandwich – a technique that lets you bypass the HttpOnly protection! This isn&#39;t your average dessert; it’s a recipe for disaster if your app isn’t prepared: https://portswigger.net/research/stealing-httponly-cookies-with-the-cookie-sandwich-technique</description><pubDate>22 Jan 2025 15:06 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lgdnf6nb6c2g</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3ldqj77hbms2o</link><description>New in SignSaboteur v1.0.6!&#xA;Now supports Ruby on Rails Encrypted Cookies:&#xA;- Brute force secret keys&#xA;- Decrypt cookie values&#xA;Update now:</description><pubDate>20 Dec 2024 13:40 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3ldqj77hbms2o</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lcihjmv5js2c</link><description>I really liked how this research turned out. I hope you did too.&#xA;&#xA;[contains quote post or other embedded content]</description><pubDate>04 Dec 2024 15:24 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lcihjmv5js2c</guid></item><item><link>https://bsky.app/profile/zakfedotkin.bsky.social/post/3lbwt6luxqc2n</link><description>Hi, Blue Sky! I am a web security researcher at PortSwigger. You can find my latest researches and tools at https://portswigger.net/research/zakhar-fedotkin</description><pubDate>27 Nov 2024 15:04 +0000</pubDate><guid isPermaLink="false">at://did:plc:ipjbzqbe5op5xmlcojtyeqzr/app.bsky.feed.post/3lbwt6luxqc2n</guid></item></channel></rss>