Anekant Singhai JainUnveiling an Account Takeover Vulnerability in a Leading Automobile BrandRecently, I had the opportunity to participate in a private bug bounty program hosted by a prominent automobile manufacturer. While I’m…May 11May 11
Anekant Singhai JainBest Approach to active Directory: 2Now in the previous blog we learnt the basics of AD and how to approach a target and what to look for in the first place. In this blog we…Feb 24Feb 24
Anekant Singhai JainBest approach to Active Directory : 1I am penning down my methodology and experience for a beginner who can learn active directory attacks , as it remains a mysterious and…Feb 20Feb 20
Anekant Singhai JainBest Approach to RCERCE , Remote code execution is the worst nightmare , a developer could have in the field of cybersecurity. Before me explaining you the…Jan 30Jan 30
Anekant Singhai JainBest Approach to LFIThis blog would not have been possible without Sachin sir , founder of Armour InfosecAug 5, 2023Aug 5, 2023
Anekant Singhai JainBest Approach to DOM XSSFirst of we need to understand the nature of this vulnerability and how it occurs , then we proceed to look forward to how to detect and…Jul 17, 20231Jul 17, 20231
Anekant Singhai JainSecurity Researcher Series : 1Why do we need client side sanitization and can we do HTML sanitization bypass?Jul 17, 2023Jul 17, 2023
Anekant Singhai JainBest approach to Error-Based SQL injectionThis is my first story for the sql injection series where I start from the In-Band SQL injection to Blind and finally covering the…Jun 16, 2023Jun 16, 2023