TECHNICAL BugPoC XSS Challenge Writeup Bypassing Content-Security-Policy and escaping an iframe sandbox.
TECHNICAL Phone numbers investigation, the open source way Learn the open source way to investigate international phone numbers.
TECHNICAL TryHackMe Writeup: ToolsRus A writeup of the TryHackMe ToolRus box teaching how to use common tools to get a foothold in a webserver.
TECHNICAL HTB Blunder Walkthrough Welcome to another great HackTheBox writeup, this time Andy From Italy is tackling the Blunder box.
TECHNICAL TryHackMe Writeup-Vulnversity Learn how to bypass upload restrictions on a web server and gaining root access with this TryHackMe technical walkthrough.
TECHNICAL HTB Cache Walkthrough Welcome to another of my world famous HackTheBox walkthroughs, this time I am tackling the HTB Cache box, so lets jump right in!
TECHNICAL HTB Blackfield Walkthrough Welcome back to another HackTheBox machine pentesting session, this time we will tackle the Blackfield box.
TECHNICAL Vulnhub Kioptrix #5 Exploitation of a vulnerable Free BSD OS machine, and rooting it by escalating privileges.
TECHNICAL THM-Writeup-BOLT Learn to exploit a vulnerable CMS (Content Management System) using Remote Code Execution.
INFOSEC Advanced boolean-based SQLi filter bypass techniques Learn how to bypass filters and Application Firewall rules using MySQL String Functions, Regex Functions, Conditional Select and Set Variables to exploit a blind (boolean-based) SQL Injection vulnerability.
TECHNICAL HTB Remote WalkThrough Welcome to my HTB Remote walk through, I found this to be a challenging machine despite other users rating this as simple!
TECHNICAL A Brief Introduction To XSS An introduction to cross-site scripting (XSS), including the basics, the methodology, the dangers and mitigations against XSS attacks.
TECHNICAL THM Kenobi Write Up Learn to exploit and take over a vulnerable Linux based machine with the 'Kenobi' room on TryhackMe.
TECHNICAL TryHackMe WriteUp: Linux Challenges This write-up goes through finding flags on a Linux Machine using different commands, services, and tools found in Linux Operating System.
CYBERSEC AWS CDK vs Serverless Framework Let's compare Serverless Framework and AWS CDK for framework ease of use, extensibility, and security.
TECHNICAL cors/sop/origin Cross origin requests, let's talk about cors, sop and origin and how these security measures can lead to vulnerabilities in your applications.
TECHNICAL XSS: Arithmetic Operators & Optional Chaining To Bypass Filters & Sanitization How to use JavaScript Arithmetic Operators and Optional Chaining to bypass input validation, sanitization and HTML Entity Encoding.
TECHNICAL HackTheBox "Find the Secret Flag" Reversing Challenge Welcome to my technical write up of the new HackTheBox reversing tutorial 'Fund The Secret Flag'.