Kanhaiya PanchalExploring XSS Attack: My Approaches, Techniques, and Mitigation for Identifying in Web ApplicationsHi Readers!Aug 15, 20232Aug 15, 20232
Kanhaiya PanchalHow Metadata Can Reveal Sensitive Information During Pentesting.Today I’m going to talk about a common issue that many people might not be aware of metadata. Metadata is data that describes other data…Aug 13, 20231Aug 13, 20231
Kanhaiya PanchalInsecure Processing of Credit Card Data: The Most Simple Bug in PentestingIn this blog post, I will discuss how applications process credit card information and the simple bugs that you should look out for. I will…Aug 5, 2023Aug 5, 2023
Kanhaiya PanchalAuthentication Attack — How to get access to an account of the logged-out userHi everyone, welcome to my third blog post! In this post, I will be discussing simple authentication attacks in web application security…Jul 23, 20231Jul 23, 20231
Kanhaiya PanchalTop Bugs you must look for pentesters and bug bounties — Forgot PasswordHello readers, this is my second blog post. In this post, I will discuss password attacks in web application security assessments. These…Jul 8, 2023Jul 8, 2023
Kanhaiya PanchalFirebase Data Exposed in Android/IOS and FixEvery day we hear of customer data being compromised, data being placed on the dark web for sale, or similar cybersecurity breaches…Feb 25, 2023Feb 25, 2023