Hey guys Pratik this side. In this writeup, I’m going to share some of my open-redirection hunts and what resources I use to find open-redirection as well as how do I make its severity higher. So let’s hop into it.
Hey folks, in this blog I’m going to share how I found a bug that steals your data with the help of a picture. Let's jump into it.
This vulnerability allows an attacker to fetch the user's IP Address, in which country they live, region, what ISP they use.
This vulnerability can be found in the places where you have an option to upload photos using tags or URLs for example forums, discussion pages. or you can simply use <img src=”malicious-link”>.
Hey folks, in this blog I’m going to share how do you guys get started in CTF: Capture The Flag (“Jhande Ukhaadne Hai”). So let’s jump into it.
Before knowing about how to get started in CTF let’s first understand what CTF is, what we do in CTF, what is a flag, and is CTF helps you to polish your hacking skills.
CTF: Capture the Flag is a type of information security competition that challenges competitors to solve a variety of tasks. It is a special type of cybersecurity competition designed to challenge computer participants to solve computer security problems…
Hey folks, in this blog I’m going to share how do you guys get started in Ethical Hacking (“Achi waali hacking” Local Indian Term). So let’s jump into it.
Before knowing about how to get started in Ethical Hacking let’s first understand what hacking is, what hackers are, what is ethical hacking, and what ethical hackers do.
For me, Hacking is an attempt to penetrate or into any digital services such as computers, IoT, etc or we can say, it is the unauthorized access to or control over computer network security systems for some illegal purpose.
People used to say…
I got lots of message for Microsoft POC on Instagram and whatsapp also So i think write a blog for it.
Client-side template injection vulnerabilities arise when applications using a client-side template framework dynamically embed user input in web pages. When a web page is rendered, the framework will scan the page for template expressions, and execute any that it encounters. An attacker can exploit this by supplying a malicious template expression that launches a cross-site scripting (XSS) attack. …
Hello guys, After a lot of requests and questions on topics related to Bug Bounty like how to start, how to beat duplicates, what to do after reading a few books, how to make great reports. I am here with my new Updated Blog and answering all of such questions. I am starting from basic as prerequisites to tips and labs along with report writing skills. I have also included some of my personally recommend tips and how to write great reports. Hope you all like it.