Open in app

Sign in

Medium Logo
Write

Sign in

Rajeev
Rajeev

52 followers

Home

Lists

About

The Eternal Dichotomy: Cookies vs JWTs

Design considerations for state maintenance will have security consequences

Jan 14, 2024
The Eternal Dichotomy: Cookies vs JWTs
The Eternal Dichotomy: Cookies vs JWTs
Jan 14, 2024

Canvas of Intrigue: A `Refreshing` Approach to Session Token Exfiltration with XSS

A story of infiltration transcending security layers with a novel approach

Sep 30, 2023
Canvas of Intrigue: A `Refreshing` Approach to Session Token Exfiltration with XSS
Canvas of Intrigue: A `Refreshing` Approach to Session Token Exfiltration with XSS
Sep 30, 2023

Cookie Conundrum: Why the Root Path Isn’t Always Right

Subdirectory hosting, also known as subfolder hosting, is a web hosting approach where multiple web applications are hosted under a single…

Sep 23, 2023
Cookie Conundrum: Why the Root Path Isn’t Always Right
Cookie Conundrum: Why the Root Path Isn’t Always Right
Sep 23, 2023

Templating the Unthinkable: From Injection to Remote Control

A Tale of Server Side Template Injection leading to Remote Code Execution

Aug 9, 2023
1
Templating the Unthinkable: From Injection to Remote Control
Templating the Unthinkable: From Injection to Remote Control
Aug 9, 2023
1

Decoding a known vulnerability on jquery-ui (CVE-2022–31160)

Often these days, web applications are built with fragile architectures which depend on various open source dependencies directly or…

Jul 2, 2023
Decoding a known vulnerability on jquery-ui (CVE-2022–31160)
Decoding a known vulnerability on jquery-ui (CVE-2022–31160)
Jul 2, 2023

Cross-Site Scripting on a Text Editor

Cross-site scripting is the most pervasive vulnerability in web applications. There are many approaches and contexts to acheive this…

Apr 4, 2023
Cross-Site Scripting on a Text Editor
Cross-Site Scripting on a Text Editor
Apr 4, 2023

Comprehensive guide on SAML Authentication attacks

Security Assertion Markup Language (SAML)

Feb 12, 2023
Comprehensive guide on SAML Authentication attacks
Comprehensive guide on SAML Authentication attacks
Feb 12, 2023

DNS Rebinding attack

DNS Rebinding is a method of bypassing Same Origin Policy by manipulating DNS resolution

Feb 8, 2023
1
DNS Rebinding attack
DNS Rebinding attack
Feb 8, 2023
1
Rajeev

Rajeev

52 followers

Pentester | Security Enthusiast

Following
  • Mahmoud M. Awali

    Mahmoud M. Awali

  • Sunil Yedla

    Sunil Yedla

  • 0xold

    0xold

  • Lizzie Moratti

    Lizzie Moratti

  • Sourav Kalal

    Sourav Kalal

See all (70)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech