Harry DCreating your products and services with design thinkingHenry Ford said, “If you ask your customers what they want, they would have said they want a faster horse”. Customers do not know what they…May 12May 12
Harry DThreat Hunting 101— Part1This is a primer for threat hunting. I would be doing a series of articles around it. So let’s start by defining what threat hunting is…Dec 31, 2020Dec 31, 2020
Harry DWhat is a Magic Byte and how to exploitYou might be wondering what exactly is magic byte and what is so magical about it. Don’t worry if you are a programmer you might already…Sep 27, 2020Sep 27, 2020
Harry DBusiness logic vulnerabilities — Low-level logic flawThis is the third of the series of articles for business logic vulnerabilities. This one is more complicated than the previous two.Sep 13, 20202Sep 13, 20202
Harry DBusiness logic vulnerabilities — High-level logic vulnerabilityThis is the second in the series of various Business login vulnerabilities. You can find the first one here.Sep 12, 2020Sep 12, 2020
Harry DBusiness Logic Vulnerabilities excessive client-side controlsThink of a scenario where you login to an eCommerce website to buy something. Below are the steps you will follow.Sep 8, 2020Sep 8, 2020