This talk shares the various techniques I found whilst building the XSS cheat sheet. It contains auto executing vectors, AngularJS CSP bypasses and dangling markup attacks.
Fighting Against Chaotically Separated Values with EmbulkSadayuki Furuhashi
?
We created a plugin-based data collection tool that can read any chaotically formatted files called "CSV" by guessing its schema automatically
Talked at csv,conf,v2 in Berlin
http://csvconf.com/
The document is about a 2017 developer day hosted by iFunFactory. It discusses iFunFactory's technology for powering games. The technology provides flexibility for different types of games, high performance through optimizations, and tools to help developers build and monitor their games. The event aimed to help developers learn how to create great games using iFunFactory's technology.
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015CODE BLUE
?
Microsoft's web browsers, Internet Explorer and Edge, have a feature called 'XSS filter' built in which protects users from XSS attacks. In order to deny XSS attacks, XSS filter looks into the request for a string resembling an XSS attack, compares it with the page and finds the appearance of it, and rewrites parts of the string if it appears in the page. This rewriting process of the string - is this done safely? The answer is no. This time, I have found a way to exploit XSS filter not to protect a web page, but to create an XSS vulnerability on a web page that is completely sane and free of XSS vulnerability. In this talk, I will describe technical details about possibilities of XSS attacks exploiting XSS filter and propose what website administrators should do to face this XSS filter nightmare.
This talk shares the various techniques I found whilst building the XSS cheat sheet. It contains auto executing vectors, AngularJS CSP bypasses and dangling markup attacks.
Fighting Against Chaotically Separated Values with EmbulkSadayuki Furuhashi
?
We created a plugin-based data collection tool that can read any chaotically formatted files called "CSV" by guessing its schema automatically
Talked at csv,conf,v2 in Berlin
http://csvconf.com/
The document is about a 2017 developer day hosted by iFunFactory. It discusses iFunFactory's technology for powering games. The technology provides flexibility for different types of games, high performance through optimizations, and tools to help developers build and monitor their games. The event aimed to help developers learn how to create great games using iFunFactory's technology.
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015CODE BLUE
?
Microsoft's web browsers, Internet Explorer and Edge, have a feature called 'XSS filter' built in which protects users from XSS attacks. In order to deny XSS attacks, XSS filter looks into the request for a string resembling an XSS attack, compares it with the page and finds the appearance of it, and rewrites parts of the string if it appears in the page. This rewriting process of the string - is this done safely? The answer is no. This time, I have found a way to exploit XSS filter not to protect a web page, but to create an XSS vulnerability on a web page that is completely sane and free of XSS vulnerability. In this talk, I will describe technical details about possibilities of XSS attacks exploiting XSS filter and propose what website administrators should do to face this XSS filter nightmare.
The document discusses code for handling database operations across multiple database systems. It defines macros and functions for executing stored procedures and functions across MySQL and Oracle databases. Code snippets show implementations for executing the same operations in both databases consistently.
The document discusses asynchronous programming using generators and fibers. It shows how to define generators that yield values, consume and produce items in a queue asynchronously, and execute asynchronous tasks using the await keyword. Fibers are lightweight threads that can suspend execution and are scheduled concurrently using a scheduler. Exceptions must be caught and propagated properly when using fibers.