PinnedPublished inInfoSec Write-upsUnlocking Cash: Easy P1 Bug in Grafana Dashboard with Default Credentials = €€€€Hello there,Nov 10, 2023A response icon4Nov 10, 2023A response icon4
PinnedPublished inInfoSec Write-upsHunting for Hidden Treasures: Unveiling the 403 Bypass Bug Bounty Adventure 🕵️♂️💰Oct 15, 2023A response icon3Oct 15, 2023A response icon3
PinnedPublished inInfoSec Write-upsWeb Application Vulnerabilities: CRLF Injection and BeyondOct 11, 2023Oct 11, 2023
Published inInfoSec Write-upsFrom Open Redirect to Internal Access: My SSRF Exploit StoryHello there,Jul 6A response icon3Jul 6A response icon3
Published inInfoSec Write-upsHow I Hacked Accounts Using Host Header Injection in Password Reset Link — $$$$Hello there,Jun 18A response icon8Jun 18A response icon8
Published inInfoSec Write-upsUnauthenticated Kibana Dashboard Access — A Serious Security Risk You Can’t IgnoreHello there,May 31A response icon1May 31A response icon1
Published inInfoSec Write-upsHow I Discovered a Web Cache Deception Attack Exposing PII — A Real-World Case StudyHello there,May 31May 31
Published inInfoSec Write-upsBug Bounty and Penetration Testing Explained: What’s the DifferenceHello there,May 29May 29
Exploiting the Unprotected: How I Gained Unauthorized Access to RedisHello there,Oct 1, 2024A response icon1Oct 1, 2024A response icon1
Published inInfoSec Write-upsOpen-redirection leads to a bountyHey guys Pratik this side. In this writeup, I’m going to share some of my open-redirection hunts and what resources I use to find…Jul 10, 2020A response icon3Jul 10, 2020A response icon3