PinnedSaumya KasthuriDemystifying SAML Misconfigurations — Hacking SAML Part 2Welcome to Part 2 of our SAML exploration. In the previous part, we laid the groundwork by dissecting SAML’s fundamental aspects. Now, we…Oct 31, 2023Oct 31, 2023
PinnedSaumya KasthuriDemystifying SAML Misconfigurations — Hacking SAML Part 3Welcome to the last part of our complete SAML series. In Part 2, we talked about problems, but there’s more to learn. In Part 3, we’re…Oct 31, 2023Oct 31, 2023
PinnedSaumya KasthuriinAppseccoDemystifying SAML Misconfigurations — Hacking SAML Part 1Welcome to our three-part series on Security Assertion Markup Language (SAML). SAML is a crucial framework for implementing Single Sign-On…Oct 25, 2023Oct 25, 2023
PinnedSaumya KasthuriAndroid Pentesting 101: A Novice’s Handbook to Getting StartedAndroid pentesting is the process of evaluating the security of an Android application by identifying its vulnerabilities and weaknesses…Oct 18, 20234Oct 18, 20234
PinnedSaumya KasthuriinAppseccoHacking Apps using NoSQL InjectionsThis article takes you through an example of an application vulnerable to injection supported by a NoSQL database (MongoDB). In common…Nov 8, 2022Nov 8, 2022
Saumya KasthuriPart 2-5. Authorization testingTesting Directory Traversal and File Inclusion VulnerabilitiesAug 30Aug 30
Saumya KasthuriPart 2-4. Authentication testingTesting for Unencrypted Channels (HTTP) in Web ApplicationsAug 22Aug 22
Saumya KasthuriPart 2–2.Configuration & deployment management testing1. Test Network ConfigurationAug 22Aug 22