AkashyadavWeb Application FundamentalsA web application is a software program that user interact with through a web browser over a network mostly internet. These applications…Jun 22Jun 22
AkashyadavIVR (Interactive Voice Response) Penetration testingHello hacker! As you all read my previous article on IVR phishing…Apr 29Apr 29
AkashyadavRed Team EngagementsHello hacker! In this article, we are going to understand the fundamentals of red team engagement. This article will contain most of…Feb 21Feb 21
AkashyadavJanus Vulnerability for Android PenetratingHello, hacker’s! In this write-up, we are going to learn about the Janus vulnerability. In short, Janus is an Android application…Oct 22, 2023Oct 22, 2023
AkashyadavGoogle map API Key Disclosure VulnerabilityHello, Hacker! In this write-up, we are going to read about the Google Maps API key disclosure vulnerability. I hope you all will like…Oct 19, 2023Oct 19, 2023
AkashyadavPort-swigger Lab : CORS vulnerability with trusted null origin -04Hello hackers! In this write-up, we are going to solve the port-swigger lab challenge of CORS vulnerability with trusted null origin. In…Oct 12, 2023Oct 12, 2023
AkashyadavPort-swigger Lab : CORS vulnerability with basic origin reflection -03Hello, Hacker’s! In this write-up we are going to get some practical knowledge on CORS vulnerability by solving the port-swigger lab.Oct 11, 2023Oct 11, 2023
AkashyadavCross-Origin Resource Sharing (CORS) 02Hello Hacker’s, In the last blog, we learned about the SOP, CORS, Origin, and ACAO. In this blog, we are going to learn about the CORS…Oct 11, 2023Oct 11, 2023
AkashyadavCross-Origin Resource Sharing (CORS) — 01Hello, Fellow hackers, It's been a while with you guys. Thanks for supporting me and reading my stories. In this story, we will learn some…Oct 10, 2023Oct 10, 2023
AkashyadavIVR (Interacting Voice Response) PhishingHello, fellow Hackers, In this write-up, we are going to get a detailed understanding of what IVR phishing is and how to avoid it.Oct 2, 2023Oct 2, 2023