Adithyakrishna VinTowards DevAPI Bug Bounty Hunting: Reconnaissance and Reverse Engineering an APIIn order to target APIs, you must first be able to find them.APIs meant for consumer use are meant to be easily discovered. Typically, the…Sep 11Sep 11
Adithyakrishna VinTowards DevBusiness Logic Vulnerabilities or Application Logic Vulnerabilities or simply “logic flaws”Business logic vulnerabilities, also known as application logic vulnerabilities, refer to security flaws or weaknesses in the logical flow…May 18May 18
Adithyakrishna VinTowards Devgdb: How To Use In CTFsgdb (GNU Debugger) is a powerful tool for debugging programs in C and other languages. It allows you to inspect the program's state, set…Dec 21, 2023Dec 21, 2023
Adithyakrishna VALGORITHMSI’m making this for my quick reference for what I learned from the video series below and other sources.Dec 11, 2023Dec 11, 2023
Adithyakrishna VinTowards DevJWT attacksHow it normally works vs How jwt works (nothing saved in server).Aug 12, 2023Aug 12, 2023
Adithyakrishna VinTowards DevPrototype PollutionIn client-side JavaScript, this commonly leads to DOM XSS, while server-side prototype pollution can even result in remote code execution.Jul 4, 2023Jul 4, 2023
Adithyakrishna VChicago American Nazi Party: HackThisSiteFrom: DestroyFascismMay 14, 2023May 14, 2023