How to configure SSL on EC2 instance for free
The post is a walkthrough on how to configure ssl on linux instances. This can also be helpful when exploiting CORS.
The post is a walkthrough on how to configure ssl on linux instances. This can also be helpful when exploiting CORS.
Read about an interesting scenario of IDOR that allowed to me view private user information and also delete publicly available list.
The post disccuss around the basics of OAUTH and how to hunt for OAUTH vulnerabilities like leaking tokens, abusing redirect URI, absense of state parameter.
The post talks about an interesting find of XSS even when the filter was used. It also covers the mistakes that a developer makes while sanitizing input.
The post covers various techniques by which sensitive data can be exfilterated using out of band interaction in XXE
XXE remains amongst the one with a critical score on the severity perspective. Why? Being able to read server's sensitive files is where the victim can be fully compromised.
Doctor is an easy linux machine from hackthebox. The initial foothold exploits SSTI/XSS and with splunkd you get the privilege escalation
End-users constantly make GET or POST request to the internet to retrieve information. The most common protocol used here is HTTP/S. But this communication is not just about making requests. It needs to be meaningful when sent from client to server or vice-versa. Here’s when HTTP header comes in. With headers, client/server can send additional information with HTTP request. In this blog…
Deploy django web applications for free on pythonanywhere. Also solve the hassle of storing static files.