The Power of Reporting: How to write effective reportsThe bulwark of our digital ecosystem, Penetration Testing (pentesting), has the arduous task of staving off numerous cyber threats. An…Aug 6, 20231Aug 6, 20231
Learn365 Challenge Review & Year 2021 in a NutshellLearning is an essential factor irrespective of your domain, level of expertise and experience. It helps one to constantly improve their…Dec 22, 20211Dec 22, 20211
Attacking Social Logins: Pre-Authentication Account TakeoverAuthentication is one of the most crucial aspects when it comes to the security of an application. However, suppose an attacker can bypass…Jun 11, 20211Jun 11, 20211
How do I get Started in Cyber Security? — My Perspective & Learning Path!Cyber Security, Ethical Hacking, Application Security, Penetration Testing, Bug Bounties, etc., these career options are blooming and…Mar 6, 202123Mar 6, 202123
Got Cookies? Cookie Based Authentication Vulnerabilities in WildCookies are a widely used way to enable authentication in the majority of applications. Over time, there has been a lot of security…Mar 2, 2021Mar 2, 2021
Published inInfoSec Write-upseWPTXv2 Exam ReviewWeb Application is commonly found part of any organization’s infrastructure and often is exposed publicly and accessible by the world. Due…Feb 16, 20213Feb 16, 20213
Scope Based Recon: Smart Recon TacticsReconnaissance a.k.a. Recon is an essential process, especially when dealing with Black Box Penetration Testing where you have no…Feb 16, 2021Feb 16, 2021
Bypassing the Protections — MFA Bypass Techniques for the WinMulti-Factor Authentication (MFA) often known as Two-Factor Authentication (2FA) is an added layer of protection added to an application…Jan 27, 20212Jan 27, 20212
Published inInfoSec Write-upseCPPTv2 Exam ReviewThe penetration Testing domain has grown exponentially in the last couple of years and so the competition. Validating and Proving your…Jan 12, 20212Jan 12, 20212
Published inInfoSec Write-upsEvading Filters to perform the Arbitrary URL Redirection AttackArbitrary URL Redirection Attack often is popularly known as an Open Redirection attack, which is a common web vulnerability that allows…Nov 12, 20202Nov 12, 20202
Published inInfoSec Write-upsAccidental Observation to Critical IDORInsecure Direct Object Reference falls under the category for Broken Access Controls as per OWASP TOP 10 (2017 Edition). This issue…Oct 24, 20202Oct 24, 20202
Published inInfoSec Write-upsS3 Bucket Misconfigured Access Controls to Critical VulnerabilityAmazon S3 (Simple Storage Service) is one of the popular and widely used storage services. Many companies are using S3 buckets to store…Jul 2, 20201Jul 2, 20201
Published inInfoSec Write-upsLet’s Bypass CSRF Protection & Password Confirmation to Takeover Victim Accounts :DCross-Site Request Forgery (CSRF) is hardly seen with new frameworks but is yet exploitable like old beautiful days. CSRF, a long story…Jun 12, 20203Jun 12, 20203
Published inInfoSec Write-upsXSS to Database Credential Leakage & Database Access — Story of total luck!Reflected Cross-Site Scripting happens when you provide a malicious javascript code to some input parsing functionality and due to lack of…Jun 6, 2020Jun 6, 2020
Published inInfoSec Write-upsFound Stored Cross-Site Scripting — What’s Next? — Privilege Escalation like a Boss :DCross-site scripting is one of the prominent attacks of all time. It is still being exploited in the wild. Cross-site scripting is always…May 19, 20202May 19, 20202
Published inInfoSec Write-upsWeak Cryptography in Password Reset to Full Account TakeoverMost of the applications provide the user’s with functionality to “Reset Password” via email. This functionality has always been a part of…May 15, 20205May 15, 20205
Published inInfoSec Write-upsWeird Story of Captcha to Rate Limit BypassWhen an application is not implementing a mechanism to limit the number of emails and messages triggered in an X amount of time, this…May 9, 20204May 9, 20204
Published inInfoSec Write-upsEffective Vulnerability Report Writing — Quick Triages to Bonus $$$ (Always a Win)Bug Bounty or Vulnerability research always has two sides. One is to discover & exploit security vulnerabilities and another important…May 2, 20201May 2, 20201
Recon to Sensitive Information Disclosure in MinutesPreviously at this Post, I talked about a critical security vulnerability as a result of Recon. Reconnaissance plays an important role and…Apr 28, 20201Apr 28, 20201
From Recon to P1 (Critical) — An Easy WinReconnaissance is an important phase when you do an application assessment, especially to gather in-depth knowledge about your target…Apr 24, 20204Apr 24, 20204