Category: Mix

Smuggling an (Un)exploitable XSS – RCE Security
19
Mar
2023

Smuggling an (Un)exploitable XSS – RCE Security

This is the story about how I’ve chained a seemingly uninteresting request smuggling vulnerability with an even more uninteresting header-based…

Broken Access Control - Lab #8 UID controlled by parameter, with unpredictable UIDs | Short Version
19
Mar
2023

Broken Access Control – Lab #8 UID controlled by parameter, with unpredictable UIDs | Short Version

Broken Access Control – Lab #8 UID controlled by parameter, with unpredictable UIDs | Short Version Source link

When You Use One Wrong Javascript Module
19
Mar
2023

When You Use One Wrong Javascript Module

When You Use One Wrong Javascript Module Source link

PoC RCE
19
Mar
2023

Basic recon to RCE II

I originally wanted to name this article “The RCE that everyone missed”, but since it was too “clickbait”, this is…

Packetlabs Ltd delivers advanced testing capabilities with Burp Suite Certified Practitioners | Blog
19
Mar
2023

Packetlabs Ltd delivers advanced testing capabilities with Burp Suite Certified Practitioners | Blog

Emma Stocks | 27 January 2023 at 11:11 UTC We launched the Burp Suite Certified Practitioner (BSCP) certification at the…

[Research] Phishermans Friend – Getting control over a phishing backend
19
Mar
2023

[Research] Phishermans Friend – Getting control over a phishing backend

Dear Readers, once in a while I enjoy blogging about things unrelated to bug bounties. And so, as it happens,…

How to Hunt for Zip Slip Exploits in Open Source Bug Bounty | huntr.dev #methodology
18
Mar
2023

How to Hunt for Zip Slip Exploits in Open Source Bug Bounty | huntr.dev #methodology

How to Hunt for Zip Slip Exploits in Open Source Bug Bounty | huntr.dev #methodology Source link

I QUIT RECON... and made $10,000 in bounties!
18
Mar
2023

I QUIT RECON… and made $10,000 in bounties!

I QUIT RECON… and made $10,000 in bounties! Source link

Let's Nmap
18
Mar
2023

Let’s Nmap

Let’s Nmap Source link

[INTERVIEW] [France 3 Alpes] Interview on Ethical Hacking
18
Mar
2023

[INTERVIEW] [France 3 Alpes] Interview on Ethical Hacking

[INTERVIEW] [France 3 Alpes] Interview on Ethical Hacking Source link

VPNs, Proxies and Secure Tunnels Explained (Deepdive)
18
Mar
2023

VPNs, Proxies and Secure Tunnels Explained (Deepdive)

VPNs, Proxies and Secure Tunnels Explained (Deepdive) Source link

Creating a security culture - awareness is not enough
18
Mar
2023

Creating a security culture – awareness is not enough

For Cybersecurity Awareness Month 2019, I published a daily blog series especially for non-tech users. I was thinking about writing…