#7. Bug Bounty Series: Password Reset Poisoning AttackHello👋 and welcome, fellow cyber explorers!. Today, I’m excited to talk about a sneaky type of attack known as password reset poisoning…Nov 13Nov 13
#6. Bug Bounty Series: Vertical Privilege Escalation via Session StorageHello👋 and welcome, fellow cyber explorers!. Today, I’m excited to share my another write-up on vertical privilege escalation where I…Oct 5Oct 5
#5. Bug Bounty Series: $$$ by AWS S3 Bucket misconfigurationsHello guys 👋 In this writeup, I’m going to explain how I was able to take control of target website’s S3 bucket. So, without any further…Sep 17Sep 17
#4. Bug Bounty Series: Exploiting Boolean-based SQL InjectionHello guys 👋 I’ve returned with one more article that is Boolean-based SQL Injection through which I was able to get the user credentials.Aug 24Aug 24
#3. Bug Bounty Series: OTP Verification bypass leads to unauthorized booking appointmentHello guys 👋 I’ve returned with yet another article that is OTP verification Bypass through which I was able to access and do the booking…Jun 253Jun 253
#2. Bug Bounty POC: Time-Based SQL Injection to Dump DatabaseHello👋 and welcome, fellow cyber explorers!. Today, I’m excited to share my latest write-up on time-based SQL injection💉, where I’ll walk…May 11May 11
#9.TryHackMe Series writeups-LazyAdminHey 👋,Welcome back to series, it is time to solve another challenge i.e. “LazyAdmin”.Mar 5Mar 5
#8.TryHackMe Series writeups: tomghostHello guys 👋 I’m back with another walkthrough, this time tackling on tomghost Lab from TryHackMe.Feb 21Feb 21
#7.TryHackMe Series writeups: Fowsniff CTFHello guys 👋 I’m back with another walkthrough, this time tackling on Fowsniff CTF Lab from TryHackMe.Jan 30Jan 30