#web-security
8 articles
-
NoSQL Injection: Exploitation Techniques and Attack Scenarios 💣
·6 min read -
Subdomain Takeover: When Your Own Domain Becomes Your Enemy 🕵️♂️
·5 min read -
Why IDORs Are Everywhere — And How to Find Them — Part I
·5 min read -
How We Discovered a Stored HTML Injection in a Chatbot System 🕷️
·4 min read -
SSRF: When Your Server Becomes a Nosy Hacker — Part 1
·8 min read -
Rate Limiting: When Your Server Says Chill, Bro.
·5 min read -
The Silent Threat: Understanding Pre-Account Takeover Attacks 🕵️♀️
·5 min read -
When Data Whispers Secrets: Understanding Sensitive Information Disclosure in Modern Systems 🔐
·5 min read