web-security
8 Posts
-
NoSQL Injection: Exploitation Techniques and Attack Scenarios 💣
NoSQL Injection: Exploitation Techniques and Attack Scenarios 💣
|6 min read -
Subdomain Takeover: When Your Own Domain Becomes Your Enemy 🕵️♂️
Subdomain Takeover: When Your Own Domain Becomes Your Enemy 🕵️♂️
|5 min read -
Why IDORs Are Everywhere — And How to Find Them — Part I
Why IDORs Are Everywhere — And How to Find Them — Part I
|5 min read -
How We Discovered a Stored HTML Injection in a Chatbot System 🕷️
How We Discovered a Stored HTML Injection in a Chatbot System 🕷️
|4 min read -
SSRF: When Your Server Becomes a Nosy Hacker — Part 1
SSRF: When Your Server Becomes a Nosy Hacker — Part 1
|8 min read -
Rate Limiting: When Your Server Says Chill, Bro.
Rate Limiting: When Your Server Says Chill, Bro.
|5 min read -
The Silent Threat: Understanding Pre-Account Takeover Attacks 🕵️♀️
The Silent Threat: Understanding Pre-Account Takeover Attacks 🕵️♀️
|5 min read -
When Data Whispers Secrets: Understanding Sensitive Information Disclosure in Modern Systems 🔐
When Data Whispers Secrets: Understanding Sensitive Information Disclosure in Modern Systems 🔐
|5 min read