Back to directory
WRITEUP #3420

Spook.js: Attacking Google Chrome's Strict Site Isolation via Speculative Execution and Type Confusion

OtherBrowser hackingSide-channel attackSite Isolation bypass
byAyush Agarwal
Program
Google
Published
Sep 8, 2021
Added to HackDex
Sep 15, 2022
Read Full Writeuphttps://www.spookjs.com
RELATED WRITEUPS
Data Theft in Salesforce: Manipulating Public Links
OtherSOQL injection
When Certificates Fail: A Story of Bypassed MFA in Remote Access
Other2FA / MFA bypass
SSTI in Bug Bounty Program: The Time I Played with Handlebars and Broke Stuff
OtherSSTI
Ghost In The Ppl Part 1: Byovdll
OtherUse-After-Free
Part 2: From Byovdll To Arbitrary Code Execution In Lsass
OtherUse-After-Free

Built with ❤️ by Shubham Rawat