Category: Mix

Email content spoofing at IKEA.com | by Jonathan Bouman
23
Mar
2023

Email content spoofing at IKEA.com | by Jonathan Bouman

Proof of concept BackgroundPreviously we discussed XSS, open redirect bugs and unrestricted file uploads. Today we will focus on email…

Closing the Loop: Practical Attacks and Defences for GraphQL APIs | by Eugene Lim | CSG @ GovTech
23
Mar
2023

Closing the Loop: Practical Attacks and Defences for GraphQL APIs | by Eugene Lim | CSG @ GovTech

GraphQL is a modern query language for Application Programming Interfaces (APIs). Supported by Facebook and the GraphQL Foundation, GraphQL grew…

Week 1: The Road to Reality. I love watching educational Youtube… | by d0nut | d0nut reads
23
Mar
2023

Week 1: The Road to Reality. I love watching educational Youtube… | by d0nut | d0nut reads

I love watching educational Youtube channels. It’s a great way to constantly keep myself exposed to science and technology. And…

facts: Bug Bounty hunters has made ridiculous amounts of $$ from known DNS techniques..
23
Mar
2023

facts: Bug Bounty hunters has made ridiculous amounts of $$ from known DNS techniques..

facts: Bug Bounty hunters has made ridiculous amounts of $$ from known DNS techniques.. Source link

OAuth Login
23
Mar
2023

Solving DOM XSS Puzzles | Spaceraccoon’s Blog

DOM-based Cross-site scripting (XSS) vulnerabilities rank as one of my favourite vulnerabilities to exploit. It’s a bit like solving a…

Gaining access to Uber's user data through AMPScript evaluation – Assetnote
23
Mar
2023

Gaining access to Uber’s user data through AMPScript evaluation – Assetnote

Modern development and infrastructure management practices are fast paced and constantly evolving. In the race to innovate and expand, new…

Abusing internal API to achieve IDOR in New Relic
23
Mar
2023

Abusing internal API to achieve IDOR in New Relic

I recently found a nice insecure direct object reference (IDOR) in New Relic which allowed me to pull data from…

Don’t Force Yourself to Become a Bug Bounty Hunter
23
Mar
2023

Don’t Force Yourself to Become a Bug Bounty Hunter

Ever since I was a kid I was never good at doing schoolwork. I had envied everyone that seemed to…

Serverless Toolkit for Pentesters - ropnop blog
23
Mar
2023

Serverless Toolkit for Pentesters – ropnop blog

Serverless is awesome and I can’t believe this stuff is free. I’m releasing some serverless functions that I’ve developed over…

[Uber] redirect_uri is difficult to do it right – Ron Chan
23
Mar
2023

[Uber] redirect_uri is difficult to do it right – Ron Chan

I don’t have automation in my bug hunting, no sqlmap, sublist3r or jsparser. I tried, they just don’t work out…

Bug Bounties Using only Burp & Browser - 30 DAY RESULTS (UNEXPECTED)
23
Mar
2023

Bug Bounties Using only Burp & Browser – 30 DAY RESULTS (UNEXPECTED)

Bug Bounties Using only Burp & Browser – 30 DAY RESULTS (UNEXPECTED) Source link

Automate it! | Richard’s Infosec blog
23
Mar
2023

Automate it! | Richard’s Infosec blog

“If you are doing a task more than twice? Then, automate it!” I hear that phrase all the time, but…