PinnedAditya SawantinInfoSec Write-upsIOS Penetration Testing: Guide to Static TestingDuring an iOS application penetration test, a penetration tester utilizes a range of techniques, tools, and methodologies to evaluate the…Apr 23Apr 23
Aditya SawantinInfoSec Write-upsI Studied 100+ SSRF Reports, and Here’s What I LearnedAfter diving into over 100 write-ups and reports on Server-Side Request Forgery (SSRF), I’ve compiled the key insights and knowledge I’ve…Oct 63Oct 63
Aditya SawantinInfoSec Write-upsIDOR Leads To Account TakeoverIDOR, one of the most common vulnerabilities in applications, can lead to major security leaks. Today, I’ll walk you through how I…Apr 72Apr 72
Aditya SawantSupply Chain Attack: XZ Backdoor CVE-2024–3094In the realm of cybersecurity, supply chain attacks represent a particularly insidious threat. These attacks occur when malicious actors…Apr 6Apr 6