How I found an IDOR in deletion of comparison lists
Read about an interesting scenario of IDOR that allowed to me view private user information and also delete publicly available list.
Read about an interesting scenario of IDOR that allowed to me view private user information and also delete publicly available list.
The post disccuss around the basics of OAUTH and how to hunt for OAUTH vulnerabilities like leaking tokens, abusing redirect URI, absense of state parameter.
How to setup a wordpress blog from scratch with all the essential plugins to use. The theme that will make your site look and feel awesome.
The post talks about an interesting find of XSS even when the filter was used. It also covers the mistakes that a developer makes while sanitizing input.
The post covers various techniques by which sensitive data can be exfilterated using out of band interaction in XXE
XXE remains amongst the one with a critical score on the severity perspective. Why? Being able to read server's sensitive files is where the victim can be fully compromised.
Docker can never replace a VM but it has got its own special benefits. know more about the docker features
Hey everyone! This blog post covers writeups of the challenges that were created by me as part of WinjaCTF 2021. WinjaCTF is an initiative by Nullcon and it organises CTF annually. Read about my experience at first nullcon here The challenges created by me were : pieceofpie, junk, art gallery, find me, binarybits, Redeem me. I will be giving a detailed writeup…
It was my first Nullcon Training and It was a super-amazing experience. In the blog, I have mentioned about the happenings of all the 4 days. Do check it out.
Doctor is an easy linux machine from hackthebox. The initial foothold exploits SSTI/XSS and with splunkd you get the privilege escalation
Ghoul is a hard linux machine from hackthebox The privilege escalation exploits the gogs vulnerability and ssh-agent's sign-on mechanism to get the root.
Ghould is a hard linux machine from hackthebox. Find the machine in the retired section.
End-users constantly make GET or POST request to the internet to retrieve information. The most common protocol used here is HTTP/S. But this communication is not just about making requests. It needs to be meaningful when sent from client to server or vice-versa. Here’s when HTTP header comes in. With headers, client/server can send additional information with HTTP request. In this blog…
Deploy django web applications for free on pythonanywhere. Also solve the hassle of storing static files.
Hey there! This is Shreya and today I am gonna show you how to pwn buff from hackthebox. Buff is an easy level windows machine having a straightforward way to obtain initial foothold. Privilege escalation to Administrator requires to abuse a service that has its exploit available on exploit-db, still its tricky to get through. With that being said, let's get started.…