Rahul ChandanExploiting URL-Based Access Control: A Lab AnalysisIntroduction: Greetings, infosec researchers!Aug 15, 2023Aug 15, 2023
Rahul ChandanUnmasking Diva.apk: Exploiting Input ValidationGreetings, my infosec folks!Aug 8, 2023Aug 8, 2023
Rahul ChandanBreaking In: Bypassing Sieve.apk’s AuthenticationGreetings, security researchers!Jul 26, 2023Jul 26, 2023
Rahul ChandanUnderstanding Android Manifest SecurityToday, we are going to conduct a static analysis of the app “diva.apk”.Jul 25, 2023Jul 25, 2023
Rahul ChandanPrivilege Escalation in Owasp Juice ShopGreetings, Infosec warriors!Jul 6, 2023Jul 6, 2023
Rahul ChandanUnveiling Mass Assignment in VAPI | API PentestingGreetings, security researchers!Jul 2, 2023Jul 2, 2023
Rahul ChandanUnmasking Broken Level Authorization | API PentestingHello, my cyber-warriors!Jun 30, 2023Jun 30, 2023
Rahul ChandanContent Provider Exploitation in Diva: A Practical ApproachHello, my savvy hackers.Jun 6, 2023Jun 6, 2023
Rahul ChandanExploiting a Simple Admin Flaw in an Android ApplicationIntroduction: In this article, we will delve into the inner workings of Android applications and shed light on a critical vulnerability…May 26, 2023May 26, 2023
Rahul ChandanBypassing Firewall Filters for SQL Injection (SQLi)Introduction: In this article, we will explore how to bypass firewall filters using SQL injection (SQLi) techniques. We’ll walk through the…May 25, 2023May 25, 2023