thehackerblog.com - The Hacker Blog – The Hacker Blog

Description: A Hacker's Blog of Unintended Use and Insomnia.

hacking (894) network security (732) information security (644) penetration testing (374) infosec (281) exploit (82) netsec (5) hacker blog (3) router backdoor (1)

Example domain paragraphs

NOTE: If you’re just looking for the high level points, see the “ The TL;DR Summary & High-Level Points ” section of this post.

Recently I took an interest in the npm registry due to it’s critical role in the security of managing packages for all of JavaScript and Node. After registering an account and creating an example package, I began looking through various web endpoints to understand what sort of system I was dealing with.

Note: This post is going to be a bit different from the previous Chrome extension vulnerability writeups. I’m going to actually walk through the code along with you to show you how tracing through an extension generally works. For this reason the whole thing is a bit lengthy.

Links to thehackerblog.com (4)