hiburn8 πŸ“ˆπŸ”₯🎱

  • whoπŸ€“
  • Who πŸ€“ (in Regex!)
  • Apps πŸ‘¨πŸ»β€πŸ’»
  • Weird Web Series: Packing Data onto Your Browser

    Weird Web Series: Packing Data onto Your Browser

    Welcome back to Post #2 of this Weird Web series. For those who found their way here outside of my LinkedIn, the idea is to explore unconventional (and occasionally rebellious) ways to use the internet. In this ‘episode’ we’re examining how most browsers provide (free) data storage and sync mechanisms – that you can exploit…

    hiburn8

    June 29, 2025
    Coding, Research
    bookmarks, browser, browsers, p2p, passwords, sync, technology, webdev
  • Weird Web Series: A Dynamic Website on S3?

    Weird Web Series: A Dynamic Website on S3?

    During covid (as all good stories start) a good friend and I got very into making cocktails together over Facetime. We called it ‘Booze-day Tuesdays‘, later simply Tuesdays. If we ever open a cocktail bar, that’s its name. Though, we quickly realised that tracking our mixology journey wasn’t a job for pen and paper… and…

    hiburn8

    June 14, 2025
    Coding, Research
    aws, cloud, cocktail, dynamic-application, spa, technology, weirdwebseries
  • 3D Printing Perfectly Imperfect Jenga

    3D Printing Perfectly Imperfect Jenga

    Today I watched an old Ted talk by the creator of Jenga – Leslie Scott. At 8 minutes 45 seconds in, she states that “Crucially, the wooden blocks are not identical. The game just wouldn’t work if they were. In fact, each of the wooden blocks in a Jenga set is very slightly different to…

    hiburn8

    December 29, 2024
    3D printing
    3D printing, games, python
  • The Witness in Vanilla JS

    The Witness in Vanilla JS

    I love puzzle games. At some point in the last 6 months i stumbled on a puzzle game on called The Witness. Its not a new game, so this isn’t a review… but what i will say… is that the puzzle mechanics led to some of the most satisfying puzzles i’ve experienced in a game.…

    hiburn8

    May 1, 2024
    Coding, Puzzle
    programming, puzzles
  • 3D Secure (3DS) is an AppSec Headache

    3D Secure (3DS) is a security protocol that is used to authenticate online credit and debit card transactions. It is an additional layer of security for online card payments, designed to protect merchants and cardholders from fraud. Surprisingly, it is almost a quarter-century old. A bit of background first and i’ll get to the good…

    hiburn8

    June 27, 2023
    AppSec
    3DS, AppSec, Cookies, CSP, Payments
  • Guided Access Mode Bypass

    As a penetration tester who specialises in mobile apps, I get good visibility of how the enterprise is adopting/using/misusing various iOS capabilities and MDM features. One trend I’ve seen increasingly, is the use of ‘Guided Access Mode‘ to lock down devices. Guided-Access Mode (GAM), for the unfamiliar, locks the device into a single app. It’s…

    hiburn8

    October 23, 2018
    Exploits, Mobile, Penetration Testing, Research
  • High Performance Web Brute-Forcing πŸ•ΈπŸ

    Finding and exploiting unique attacks on web applications is, of-course, satisfying. But I also find that performing the most basic of attacks, but as efficiently and effectively as possible, can also pose a decent mental challenge that’s equally rewarding. In this short post i’ll show you how writing just a few lines of code can…

    hiburn8

    September 13, 2018
    Penetration Testing
  • Kinda LIKE SQL Injection

    TLDR: This post is about some late 90’s level hacking. But the fact is, that there just doesn’t exist a decent explanation of this vulnerability anywhere on the internet.. and yesterday, in 2018, I found another application vulnerable to it (to quite serious effect). I’m afraid that was the straw that broke the camel’s back.…

    hiburn8

    June 4, 2018
    Penetration Testing, Research
  • Much Badoo About Nothing

    This is justΒ a shortΒ post about toying with the Badoo app for iOS, but also touches onΒ something ever-so-slightly useful about testing the app-upgrade mechanisms of mobile apps. “Urghh more dating app hacking” I hear you say. IΒ know, I know, this is getting old. At some point i’ll get a real hobby, I promise.

    hiburn8

    June 2, 2017
    Exploits, Mobile, Penetration Testing
  • ‘App Forgery’

    In this (pretty long) post, I’m going to attempt to coin a name for an application vulnerability, most commonly found in mobile apps. This is “App Forgery”.

    hiburn8

    May 27, 2017
    Exploits, Mobile, Penetration Testing, Research
1 2 3
Next Page→

Create a website or blog at WordPress.com

  • Subscribe Subscribed
    • hiburn8 πŸ“ˆπŸ”₯🎱
    • Already have a WordPress.com account? Log in now.
    • hiburn8 πŸ“ˆπŸ”₯🎱
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar