Mayank Kumar PrajapatiPrototype Pollution: The Hidden Danger in JavaScriptPrototype Pollution is a type of vulnerability that arises when an attacker can manipulate or inject properties into the prototype of…2 min read·2 days ago----
Mayank Kumar PrajapatiUncovering Vulnerabilities Within the WordPress UniverseWhat is WordPress??🧑💻3 min read·Mar 19, 2024----
Mayank Kumar PrajapatiAn introductory guide to HTTP request smugglingWhat is HTTP request smuggling?🥷3 min read·Jan 30, 2024----
Mayank Kumar PrajapatiWhat is gold about golden ticket??Hi Guys, I am back with another interesting writeup where we will chain DC Sync attack with golden ticket. You would like to read the below…4 min read·Jan 1, 2024----
Mayank Kumar PrajapatiAll you need to know about kerberoasting..What is kerberoasting?📖6 min read·Dec 10, 2023----
Mayank Kumar PrajapatiHow kerberos authentication work??Kerberos is a basic authentication scheme that is heavily used in Active Directory environment. Client credentials is common term that you…2 min read·Dec 4, 2023----
Mayank Kumar PrajapatiExploring PowerShell Based Detection MethodsPowerShell is a scripting language that comes pre-installed majorly in all versions of Windows Operating system. It has decreased the…2 min read·Nov 23, 2023----
Mayank Kumar PrajapatiExploiting wp-cron.php to peform DoS attackWhat is wp-cron.php3 min read·Oct 29, 2023----
Mayank Kumar PrajapatiThe Art of Subdomain EnumerationSubdomain enumeration plays a vital role in web application assessment to increase the attack surface. It involves mapping subdomains…1 min read·Jun 20, 2023----