Published inInfoSec Write-upsA tale of VoIP Security TestingMost of the Corporates do not focus on their internal security. They think that they are secure because their internal assets are…Oct 10, 20201Oct 10, 20201
Published inInfoSec Write-upsUnique Case for Price Manipulation | BugBounty | VAPTPrice Manipulation is a test case for Price Tampering. Generally, Penetration testers change the amount value of the product (i.e., shoes…Jul 18, 20201Jul 18, 20201
Published inInfoSec Write-upsHow to add infinity amount(cash) to E-Commerce application’s wallet just from 1 INR only.Hi Infosec guys!!!! Hope you are doing well. If you are here then you are interested in learning more n more. This finding is not unique…Jul 12, 20202Jul 12, 20202
Published inHackcuraMultiple flaws leads to Account Takeover within an ApplicationHi folks, I tested an application that was too vulnerable. So, I thought about writing Account takeover test cases. I will not disclose…May 18, 20202May 18, 20202
Published inHackcuraBlind IDOR leads to change personal details of the company’s employees.I was doing freelancing for a company. In that company, They have private dashboard for their employees, from where Employees can modify…Mar 26, 2020Mar 26, 2020
Published inHackcuraBeginner Guide | Introduction to #VAPT (Vulnerability Assessment and Penetration Testing) and…Here we discuss about Vulnerability assessment and penetration testing and reporting tools.Jan 31, 2020Jan 31, 2020
Published inHackcuraHow to prepare for CTFs and start playing CTFsIn this write-up, you will get to know about CTF, Challenges, Tools for solving the CTF challenges, Practice Platforms, Resources and…Jan 17, 20201Jan 17, 20201
Published inHackcuraBeginner Guide | How to start Vulnerability Assessment and Penetration Testing (VAPT), Bug Bounty.Hi all, I am a cyber security enthusiast.Jan 16, 20201Jan 16, 20201