Published inHakTrak Cybersecurity SquadExploiting Unsanitized URL Handling & SQL Injection via Deep Links in iOS App: Write-up of FlipcoinBreaking Down Data Exfiltration via Unsanitized External URL Handling and SQL Injection through Deep LinksFeb 21Feb 21
Published inHakTrak Cybersecurity SquadUnderstanding Stealer Logs and Their Role in Security Testing: A Focus on Asset Discovery- Part 2From Stealer Logs to Multi-Domain Discovery: Unveiling Sensitive Files from 403 Forbidden Pages Using Archive.org RecordsJan 1Jan 1
Published inHakTrak Cybersecurity SquadBypassing iOS App Jailbreak Detection by Patching the Binary with Ghidra: Write-up of No-Escape LabAn Exploration of One of the Methods for Bypassing Jailbreak DetectionDec 24, 20241Dec 24, 20241
Published inHakTrak Cybersecurity SquadUnderstanding Stealer Logs and Their Role in Security Testing — Part 1A Thorough Exploration of Stealer Logs: What, How, and Case StudyAug 30, 20242Aug 30, 20242
Published inHakTrak Cybersecurity SquadPart 3:2 — Electron-Based App Security Testing Fundamentals — Case Study of Extract & Analyze .asarInformation Disclosure of Hardcoded Keys and Encryption Algorithm (in AesFormula.js File) Resulting in Compromised the Real CredentialsMay 1, 20241May 1, 20241
Published inHakTrak Cybersecurity SquadPart 3:1 — Electron-Based App Security Testing Fundamentals - Extract & Analyze .asarCommon Method for Extracting and Analyzing .asar FilesApr 30, 2024Apr 30, 2024
Published inHakTrak Cybersecurity SquadPart 2 — Electron-Based App Security Testing Fundamentals — Installing and Detecting…Ways to Detect Electron-Based Applications both Manually and AutomaticallyApr 24, 2024Apr 24, 2024
Published inHakTrak Cybersecurity SquadPart 1 — Electron-Based App Security Testing Fundamentals — Introduction to Electron FrameworkA Brief Overview of Electron Framework and Building a Simple ApplicationMar 17, 2024Mar 17, 2024
Published inHakTrak Cybersecurity SquadFrom Accessing Restricted URL Found in .js File, to Vertical Privilege EscalationA Story About How We Achieved Super Admin Access Through a Chain of Vulnerabilities, AlhamdulillahMar 13, 20241Mar 13, 20241
Published inInfoSec Write-upsThe Unexpected “0” Master ID for Account Data ManipulationA simple story when Allah allowed me to successfully achieve P1 through a broken access control issue using an unexpected master ID of “0”.Jun 21, 20232Jun 21, 20232