PinnedPublished inInfoSec Write-upsSimple Recon MethodologyDifferent methodology to Recon targetsDec 3, 20205Dec 3, 20205
IDOR at Login function leads to leak user’s PII dataVulnerable Login function leads to leaking PII data for all registered users.Aug 30, 20224Aug 30, 20224
Published inInfoSec Write-upsAuthentication bypass using root arrayAuthentication bypass by using root array at the login process.Mar 22, 20222Mar 22, 20222
Published inInfoSec Write-upsCisco BroadWorks Vulnerabilities CVE-2021–34785 & CVE-2021–34786Cisco BroadWorks CVE-2021–34785 and CVE-2021–34786 details and POCOct 2, 20213Oct 2, 20213
Published inInfoSec Write-upsHow to write simple script to automate finding bugsSimple way to write python script to automate finding bugsSep 26, 20211Sep 26, 20211