Pragya GuptainSystem WeaknessOAuth exploitation techniquesHey everyone! This writeup is about exploitation techniques on the OAuth mechanism which is used almost everywhere for authentication and…Dec 2, 2022Dec 2, 2022
Pragya GuptainSystem WeaknessDeep dive into JWT attacksHey everyone! This writeup is about possible attacks on JSON Web Tokens (JWTs) which are widely used for access control, session handling…Oct 21, 20221Oct 21, 20221
Pragya GuptainSystem WeaknessPortSwigger SSRF LabsHey all! This write-up is about my PortSwigger SSRF labs journey. There are a total of 7 labs, each helping us better understand the…Jul 26, 2022Jul 26, 2022
Pragya GuptainSystem WeaknessConfiguring Burp Proxy with Android Emulator in Macbook M1Hey folks! This blog post is about configuring an Android emulator with Burp Suite in Mac M1 machines that do not support Genymotion…May 6, 2022May 6, 2022
Pragya GuptainSystem WeaknessPortSwigger CSRF LabsHey all! This write-up is about my PortSwigger CSRF labs journey. There are a total of 8 labs, each helping us better understand the…Apr 30, 2022Apr 30, 2022
Pragya GuptaYamagata XSS journeyHi readers! This write-up is about my yamagata XSS labs journey. There is a total of 19 stages in this lab. We have to execute the…Mar 11, 20221Mar 11, 20221