PinnedPublished inInfoSec Write-upsSimple Recon MethodologyDifferent methodology to Recon targetsDec 3, 2020A response icon5Dec 3, 2020A response icon5
IDOR at Login function leads to leak user’s PII dataVulnerable Login function leads to leaking PII data for all registered users.Aug 30, 2022A response icon4Aug 30, 2022A response icon4
Published inInfoSec Write-upsAuthentication bypass using root arrayAuthentication bypass by using root array at the login process.Mar 22, 2022A response icon2Mar 22, 2022A response icon2
Published inInfoSec Write-upsCisco BroadWorks Vulnerabilities CVE-2021–34785 & CVE-2021–34786Cisco BroadWorks CVE-2021–34785 and CVE-2021–34786 details and POCOct 2, 2021A response icon3Oct 2, 2021A response icon3
Published inInfoSec Write-upsHow to write simple script to automate finding bugsSimple way to write python script to automate finding bugsSep 26, 2021A response icon1Sep 26, 2021A response icon1