<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>conflict</title>
  <link>https://cnf409.me/</link>
  <description>CTF writeups, cybersecurity research, and deep dives</description>
  <atom:link href="https://cnf409.me/rss.xml" rel="self" type="application/rss+xml"/>
  <language>en-us</language>
  <lastBuildDate>Thu, 16 Apr 2026 00:57:14 +0000</lastBuildDate>
  <generator>conflict-blog-builder</generator>
  <item>
    <title>10 Fast Fishers</title>
    <link>https://cnf409.me/posts/fcsc2026-10-fast-fishers/</link>
    <guid isPermaLink="true">https://cnf409.me/posts/fcsc2026-10-fast-fishers/</guid>
    <pubDate>Sun, 12 Apr 2026 00:00:00 +0000</pubDate>
    <description>Abusing cross-origin iframe navigation and Firefox&#39;s execCommand Unicode normalization to bypass a postMessage filter</description>
    <category>web</category>
    <category>web-client</category>
    <category>xss</category>
    <category>iframe</category>
    <category>postmessage</category>
  </item>
  <item>
    <title>Secure Mood Notes</title>
    <link>https://cnf409.me/posts/fcsc2026-secure-mood-notes/</link>
    <guid isPermaLink="true">https://cnf409.me/posts/fcsc2026-secure-mood-notes/</guid>
    <pubDate>Sat, 11 Apr 2026 00:00:00 +0000</pubDate>
    <description>Leaking a Snuffleupagus secret key via Apache .htaccess injection, then forging signed PHP cookies to chain a Composer gadget, smuggling an ELF into the server and escaping the sandbox via LD_PRELOAD and mail()</description>
    <category>web</category>
    <category>web-server</category>
    <category>php</category>
    <category>apache</category>
    <category>flask</category>
    <category>ld_preload</category>
    <category>pop_chain</category>
    <category>snuffleupagus</category>
    <category>rce</category>
  </item>
  <item>
    <title>CVE-2026-34036 — When your CRM&#39;s autocomplete reads more than it should</title>
    <link>https://cnf409.me/posts/cve-2026-34036/</link>
    <guid isPermaLink="true">https://cnf409.me/posts/cve-2026-34036/</guid>
    <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
    <description>Technical explanation of CVE-2026-34036</description>
    <category>cve</category>
    <category>php</category>
    <category>lfi</category>
    <category>bypass</category>
    <category>dolibarr</category>
  </item>
  <item>
    <title>Spring Drive</title>
    <link>https://cnf409.me/posts/heroctf2025-spring-drive/</link>
    <guid isPermaLink="true">https://cnf409.me/posts/heroctf2025-spring-drive/</guid>
    <pubDate>Mon, 01 Dec 2025 00:00:00 +0000</pubDate>
    <description>From String.hashCode() Collision to RCE via HTTP Method Injection</description>
    <category>web</category>
    <category>web-server</category>
    <category>java</category>
    <category>ssrf</category>
    <category>command injection</category>
    <category>clamav</category>
    <category>redis</category>
  </item>
  <item>
    <title>eezzjs</title>
    <link>https://cnf409.me/posts/n1ctf2025-eezzjs/</link>
    <guid isPermaLink="true">https://cnf409.me/posts/n1ctf2025-eezzjs/</guid>
    <pubDate>Thu, 02 Oct 2025 00:00:00 +0000</pubDate>
    <description>Exploiting a bad JWT implementation and bypassing path.extname to get RCE</description>
    <category>web</category>
    <category>web-server</category>
    <category>js</category>
    <category>rce</category>
    <category>jwt</category>
  </item>
  <item>
    <title>Sthack&#39;Millions</title>
    <link>https://cnf409.me/posts/sthack2025-sthackmillions/</link>
    <guid isPermaLink="true">https://cnf409.me/posts/sthack2025-sthackmillions/</guid>
    <pubDate>Tue, 27 May 2025 00:00:00 +0000</pubDate>
    <description>great for gambling addicts</description>
    <category>reverse</category>
    <category>misc</category>
    <category>osint</category>
    <category>web</category>
    <category>gambling</category>
    <category>qr_code</category>
  </item>
  <item>
    <title>coloratops</title>
    <link>https://cnf409.me/posts/fcsc2025-coloratops/</link>
    <guid isPermaLink="true">https://cnf409.me/posts/fcsc2025-coloratops/</guid>
    <pubDate>Sun, 27 Apr 2025 00:00:00 +0000</pubDate>
    <description>Voici un crackme plein de couleurs avec des allures old school.</description>
    <category>reverse</category>
    <category>gdb</category>
    <category>crackme</category>
  </item>
</channel>
</rss>