AnonymousshettyUncovering Vulnerabilities: My Discovery of Hashed Passwords on a Dutch Government WebsiteI often explore various websites to understand their security posture. Recently, during a routine analysis, I stumbled upon a vulnerability…Oct 25Oct 25
AnonymousshettyInformation Disclosure in Top 500 Company through Source CodeIn today’s digital landscape, information disclosure is a critical concern for organizations, particularly for those in the top 500…Oct 25Oct 25
AnonymousshettyBreaking into the Shoutcast Server of a Multimedia CompanyAs a penetration tester, I’ve come across various vulnerabilities that pose significant threats to an organization’s digital assets…Oct 8Oct 8
AnonymousshettyHow i found endpoints from reading hacker-one reportsAs a penetration tester, it’s all about creativity, right? Whether we’re hacking into systems or just trying to find overlooked…Oct 8Oct 8
AnonymousshettyDEPENDENCY CONFUSION CAN LEAD TO P2 BASEDIn the realm of cybersecurity, discovering vulnerabilities in high-profile systems is both challenging and rewarding. Recently, I stumbled…Aug 31Aug 31
AnonymousshettyHOW I GOT ACCESS TO ACCOUNT BY OTP BYPASSRecently, I discovered an OTP (One-Time Password) bypass vulnerability on a website, and I’d like to share the journey that led to this…Aug 31Aug 31
AnonymousshettyUnderstanding and Mitigating Open Redirection Vulnerability (CVE-2021–36580) in Webmail/Basic…IntroductionAug 6Aug 6
AnonymousshettyDiscovering and Exploiting an XSS Vulnerability in a Bug Bounty Program ScopeIntroduction: As a security researcher, my primary goal is to identify and report vulnerabilities to help organizations secure their…Aug 5Aug 5