Mayank Kumar PrajapatiMastering Unauthenticated XSS Detection: Best Burp Suite Configurations for XSS HuntingBurp Suite is one of the most popular tools for vulnerability scanning and manual testing created by PortSwigger. It is commonly used by…Jun 161Jun 161
Mayank Kumar PrajapatiPrototype Pollution: The Hidden Danger in JavaScriptPrototype Pollution is a type of vulnerability that arises when an attacker can manipulate or inject properties into the prototype of…May 25May 25
Mayank Kumar PrajapatiUncovering Vulnerabilities Within the WordPress UniverseWhat is WordPress??🧑💻Mar 19Mar 19
Mayank Kumar PrajapatiAn introductory guide to HTTP request smugglingWhat is HTTP request smuggling?🥷Jan 30Jan 30
Mayank Kumar PrajapatiWhat is gold about golden ticket??Hi Guys, I am back with another interesting writeup where we will chain DC Sync attack with golden ticket. You would like to read the below…Jan 1Jan 1
Mayank Kumar PrajapatiAll you need to know about kerberoasting..What is kerberoasting?📖Dec 10, 2023Dec 10, 2023
Mayank Kumar PrajapatiHow kerberos authentication work??Kerberos is a basic authentication scheme that is heavily used in Active Directory environment. Client credentials is common term that you…Dec 4, 2023Dec 4, 2023
Mayank Kumar PrajapatiExploring PowerShell Based Detection MethodsPowerShell is a scripting language that comes pre-installed majorly in all versions of Windows Operating system. It has decreased the…Nov 23, 2023Nov 23, 2023
Mayank Kumar PrajapatiExploiting wp-cron.php to peform DoS attackWhat is wp-cron.phpOct 29, 20231Oct 29, 20231
Mayank Kumar PrajapatiThe Art of Subdomain EnumerationSubdomain enumeration plays a vital role in web application assessment to increase the attack surface. It involves mapping subdomains…Jun 20, 2023Jun 20, 2023