OS Command Injection — Part 02When output is visible (“echoed” cases), you can confirm injection by chaining harmless commands: on POSIX systems try ; id, | id, or &&…Aug 16Aug 16
OS Command InjectionAhhh, here we go — back in the game! After a short break, I’m diving once again into one of my all-time favorite vulnerabilities: OS…Aug 16Aug 16
💥 Server-Side Parameter Pollution (SSPP): The Silent Threat Lurking in Your APIs“You sanitized input. You validated types. But did you check what happens when an attacker sends the same parameter twice?”Jun 10Jun 10
Unlocking the Secrets of Digital Forensics: The Science of Solving Cyber CrimesAfter spending valuable time researching digital forensics, I realized I had only scratched the surface of this intriguing field. The more…Aug 30, 2024Aug 30, 2024
Wi-Fi Hacking using Evil Twin Attacks and Captive Portals! — Part 4In this section, I’m going to teach you how to enable a captive board to log in page on your access point. So, first, off I will open the…Feb 7, 2021Feb 7, 2021
Wi-Fi Hacking using Evil Twin Attacks and Captive Portals! — Part 3Okay so in this section I’m going to show you how to sniff and inject packets into a wireless network. So, first off, I need to scan all…Feb 4, 2021Feb 4, 2021
Wi-Fi Hacking using Evil Twin Attacks and Captive Portals! — Part 2In this section [part 2] you will learn which wireless adapter you should buy for wireless penetration testing. So, to echo the Wi-Fi…Feb 4, 2021Feb 4, 2021
Wi-Fi Hacking using Evil Twin Attacks and Captive Portals! — Part 1MMMMMMMMMMMM!!!Jan 29, 2021Jan 29, 2021
SYNCHRONIZED TOKEN PATTERNImplementing Mitigation Methods For CSRF Attack — SYNCHRONIZED TOKEN PATTERNDec 27, 2020Dec 27, 2020
DOUBLE SUBMIT COOKIES PATTERNImplementing Mitigation Methods For CSRF Attack — DOUBLE SUBMIT COOKIE PATTERNDec 25, 2020Dec 25, 2020