PinnedPublished inInfoSec Write-upsOpenAI ChatGPT for Cyber SecurityHow OpenAI’s ChatGPT can be used for Cyber Security (For Red Teaming and Blue Teaming)Dec 13, 20221Dec 13, 20221
Published inInfoSec Write-upsExploiting IDOR in a Support Portal ChatbotSometimes, I avoid testing support or help portals, assuming they might be hosted on third-party platforms like Jira or Zendesk, to save…Jan 151Jan 151Get an email whenever Supun Halangoda publishes.SubscribeBy signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information about our privacy practices.Medium sent you an email at to complete your subscription.
Published inInfoSec Write-upsHow a Unique Combination Opened the Door to an IDORHello everyone! This write-up is part of my IDOR Diaries series, where I share insights on the various IDOR vulnerabilities I encounter…Nov 10, 20243Nov 10, 20243
Published inInfoSec Write-upsPhishing using Google Sheets for Red Team EngagementsFor educational purposes only. Unlawful use of phishing techniques is prohibited. Use responsibly, with proper authorization. Creators…Jan 17, 2024Jan 17, 2024
Published inInfoSec Write-upsHow to Correctly setup Android Penetration Testing on a MacBookHere’s my way of setting up for a Android Pentest on a MacBook M2 ProJan 3, 2024Jan 3, 2024
Published inInfoSec Write-upsHacking Wishlists in an E-commerce Web App (IDOR Diaries)If you haven’t checked other writes on the IDOR Diaries series you check below write-upsDec 6, 2023Dec 6, 2023
Published inInfoSec Write-upsUnveiling a Bug: Paying $1 and Receiving $100 (or Any Amount) in ReturnHi everyone, this write-up is about a vulnerability I discovered in a private bug bounty program. Due to privacy & legal concerns, I will…Jun 23, 20232Jun 23, 20232
Published inInfoSec Write-upsIDOR Vulnerability that exposed 17 Million user data (IDOR Diaries)Hi all, this write-up is about a vulnerability I discovered a few months back on a private bug bounty program.May 26, 20231May 26, 20231
Published inInfoSec Write-ups$$ Bounties for Unauthenticated file read in Cisco ASA CVE-2020–3452Hey Friends back again with a write-up, I’m bit lazy in writing Bug Bounty write-ups but here i am !!.Aug 23, 20201Aug 23, 20201
From XSS to a Directory TraversalHey Guys!! This is my first write up for a bug bounty. So Pardon me if I made any mistakes and also feel fee to express your idea below…May 22, 2020May 22, 2020
Exploiting Cisco Switches ( DHCP Attack)In this chapter I’m demonstrating you to attack a DHCP Server in a weak network…this can be also known as a DoS attack (Denial of Service…Apr 30, 2020Apr 30, 2020
CDP Flood Attack on Cisco SwitchesI thought of doing some actual attacks using real network devices. If your are a Network Engineer or a Security Engineer , this will helps…Apr 26, 2020Apr 26, 2020