<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Pentesting on Medium]]></title>
        <description><![CDATA[Latest stories tagged with Pentesting on Medium]]></description>
        <link>https://medium.com/tag/pentesting/latest?source=rss------pentesting-5</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Pentesting on Medium</title>
            <link>https://medium.com/tag/pentesting/latest?source=rss------pentesting-5</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Wed, 06 May 2026 13:55:49 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/tag/pentesting" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Sauna — HTB Writeup]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@washively/sauna-htb-writeup-53f920881648?source=rss------pentesting-5"><img src="https://cdn-images-1.medium.com/max/600/1*c4kIw5HVh4kPVYzTi3lblw.png" width="600"></a></p><p class="medium-feed-snippet">Introduction:</p><p class="medium-feed-link"><a href="https://medium.com/@washively/sauna-htb-writeup-53f920881648?source=rss------pentesting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@washively/sauna-htb-writeup-53f920881648?source=rss------pentesting-5</link>
            <guid isPermaLink="false">https://medium.com/p/53f920881648</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[active-directory]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[hackthebox]]></category>
            <dc:creator><![CDATA[William Shively]]></dc:creator>
            <pubDate>Tue, 05 May 2026 23:19:11 GMT</pubDate>
            <atom:updated>2026-05-05T23:19:11.899Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Silencing EDR Network Telemetry: WFP Callout Patching via BYOVD]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@s12deff/silencing-edr-network-telemetry-wfp-callout-patching-via-byovd-1f9ee7ed0e67?source=rss------pentesting-5"><img src="https://cdn-images-1.medium.com/max/1139/1*6krFd8yhoTZL189G3P5kKw.png" width="1139"></a></p><p class="medium-feed-snippet">Welcome to this new Medium post. Today we are going to use kernel read and write primitives to silence EDR network telemetry at the kernel&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@s12deff/silencing-edr-network-telemetry-wfp-callout-patching-via-byovd-1f9ee7ed0e67?source=rss------pentesting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@s12deff/silencing-edr-network-telemetry-wfp-callout-patching-via-byovd-1f9ee7ed0e67?source=rss------pentesting-5</link>
            <guid isPermaLink="false">https://medium.com/p/1f9ee7ed0e67</guid>
            <category><![CDATA[malware]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[infosec]]></category>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[S12 - 0x12Dark Development]]></dc:creator>
            <pubDate>Tue, 05 May 2026 21:01:12 GMT</pubDate>
            <atom:updated>2026-05-05T21:01:12.309Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[The “Infinite Discount” Glitch: How I Used a Race Condition to Buy a MacBook for -$300]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@21bec131/the-infinite-discount-glitch-how-i-used-a-race-condition-to-buy-a-macbook-for-300-4257a28e1946?source=rss------pentesting-5"><img src="https://cdn-images-1.medium.com/max/2600/0*ACWe3zfH1s6FaDGR" width="6000"></a></p><p class="medium-feed-snippet">This is the story of how a &#x201C;boring&#x201D; e-commerce site turned into a playground for a Race Condition vulnerability. If you think hacking is&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@21bec131/the-infinite-discount-glitch-how-i-used-a-race-condition-to-buy-a-macbook-for-300-4257a28e1946?source=rss------pentesting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@21bec131/the-infinite-discount-glitch-how-i-used-a-race-condition-to-buy-a-macbook-for-300-4257a28e1946?source=rss------pentesting-5</link>
            <guid isPermaLink="false">https://medium.com/p/4257a28e1946</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Tanvi Chauhan]]></dc:creator>
            <pubDate>Tue, 05 May 2026 16:21:01 GMT</pubDate>
            <atom:updated>2026-05-05T16:21:01.827Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Write-Up: BugForge Daily Challenge Cheesy Does It]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@poom66310/write-up-bugforge-daily-challenge-cheesy-does-it-f4c8c5f353dc?source=rss------pentesting-5"><img src="https://cdn-images-1.medium.com/max/1024/1*-PwBGiU8QRL6Tm_miWNMzw.jpeg" width="1024"></a></p><p class="medium-feed-snippet">Yooo! Today is a special day because this is my first-ever-write-up! &#x1F973; super fastt!~~</p><p class="medium-feed-link"><a href="https://medium.com/@poom66310/write-up-bugforge-daily-challenge-cheesy-does-it-f4c8c5f353dc?source=rss------pentesting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@poom66310/write-up-bugforge-daily-challenge-cheesy-does-it-f4c8c5f353dc?source=rss------pentesting-5</link>
            <guid isPermaLink="false">https://medium.com/p/f4c8c5f353dc</guid>
            <category><![CDATA[bugforge]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[writeup]]></category>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[ctf]]></category>
            <dc:creator><![CDATA[PrakritPrad]]></dc:creator>
            <pubDate>Tue, 05 May 2026 15:38:14 GMT</pubDate>
            <atom:updated>2026-05-05T15:57:38.729Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Server Side Template Injection]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@t4nu1/server-side-template-injection-d60ec217ab5c?source=rss------pentesting-5"><img src="https://cdn-images-1.medium.com/max/988/1*D-LapzZp1Fgz6OTXR8acjQ.png" width="988"></a></p><p class="medium-feed-snippet">Leaf challenge</p><p class="medium-feed-link"><a href="https://medium.com/@t4nu1/server-side-template-injection-d60ec217ab5c?source=rss------pentesting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@t4nu1/server-side-template-injection-d60ec217ab5c?source=rss------pentesting-5</link>
            <guid isPermaLink="false">https://medium.com/p/d60ec217ab5c</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[netcat]]></category>
            <category><![CDATA[ssti]]></category>
            <dc:creator><![CDATA[t4nu1]]></dc:creator>
            <pubDate>Tue, 05 May 2026 15:14:38 GMT</pubDate>
            <atom:updated>2026-05-05T15:14:38.016Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[What Happens When You Log In to a Website?!]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://kavitaa0909.medium.com/what-happens-when-you-log-in-to-a-website-edf8f999aa8d?source=rss------pentesting-5"><img src="https://cdn-images-1.medium.com/max/600/1*t_vWqZCSNlG1kyMrK1fQkA.jpeg" width="600"></a></p><p class="medium-feed-snippet">Logging in is something we do every day.
It feels instant. Effortless. Normal.</p><p class="medium-feed-link"><a href="https://kavitaa0909.medium.com/what-happens-when-you-log-in-to-a-website-edf8f999aa8d?source=rss------pentesting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://kavitaa0909.medium.com/what-happens-when-you-log-in-to-a-website-edf8f999aa8d?source=rss------pentesting-5</link>
            <guid isPermaLink="false">https://medium.com/p/edf8f999aa8d</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[infosec]]></category>
            <category><![CDATA[https]]></category>
            <dc:creator><![CDATA[Kavita Prajapati]]></dc:creator>
            <pubDate>Tue, 05 May 2026 12:01:27 GMT</pubDate>
            <atom:updated>2026-05-05T12:01:27.832Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Zero-Click ATO: How a Single Accent Mark Led to Account Takeovers]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@amendahunt/zero-click-ato-how-a-single-accent-mark-led-to-account-takeovers-6335a965a448?source=rss------pentesting-5"><img src="https://cdn-images-1.medium.com/max/1024/1*GSqC-895yZos3Vf3hs-aiQ.png" width="1024"></a></p><p class="medium-feed-snippet">Hello hackers, Today I want to share a recent discovery that led to a critical Account Takeover (ATO) vulnerability on a popular platform&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@amendahunt/zero-click-ato-how-a-single-accent-mark-led-to-account-takeovers-6335a965a448?source=rss------pentesting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@amendahunt/zero-click-ato-how-a-single-accent-mark-led-to-account-takeovers-6335a965a448?source=rss------pentesting-5</link>
            <guid isPermaLink="false">https://medium.com/p/6335a965a448</guid>
            <category><![CDATA[hackerone]]></category>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[hacker]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <dc:creator><![CDATA[amen]]></dc:creator>
            <pubDate>Tue, 05 May 2026 11:11:00 GMT</pubDate>
            <atom:updated>2026-05-05T11:11:51.920Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[WordPress Bug Hunting — A Practical Guide]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-snippet">Discover step by step the techniques, tools and strategies to uncover critical vulnerabilities on WordPress sites.</p><p class="medium-feed-link"><a href="https://medium.com/@hackustheinforman/mastering-wordpress-bug-hunting-853e902c9a58?source=rss------pentesting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@hackustheinforman/mastering-wordpress-bug-hunting-853e902c9a58?source=rss------pentesting-5</link>
            <guid isPermaLink="false">https://medium.com/p/853e902c9a58</guid>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[web-security]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[wordpress-security]]></category>
            <category><![CDATA[pentesting]]></category>
            <dc:creator><![CDATA[ATTER Koffi Kallern]]></dc:creator>
            <pubDate>Tue, 05 May 2026 10:56:45 GMT</pubDate>
            <atom:updated>2026-05-05T11:08:21.567Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[HackTheBox Dancing: From Anonymous SMB Access to Root]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@sobatistacyber/hackthebox-dancing-from-anonymous-smb-access-to-root-7b4017c95248?source=rss------pentesting-5"><img src="https://cdn-images-1.medium.com/max/1672/1*gGOdY-yL1m4Uelo0bSkY4g.png" width="1672"></a></p><p class="medium-feed-snippet">Welcome back, hackers! Today we are taking a look at Dancing, one of those Windows boxes that rewards calm enumeration more than flashy&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@sobatistacyber/hackthebox-dancing-from-anonymous-smb-access-to-root-7b4017c95248?source=rss------pentesting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@sobatistacyber/hackthebox-dancing-from-anonymous-smb-access-to-root-7b4017c95248?source=rss------pentesting-5</link>
            <guid isPermaLink="false">https://medium.com/p/7b4017c95248</guid>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[hackthebox-writeup]]></category>
            <category><![CDATA[hackthebox]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[pentesting]]></category>
            <dc:creator><![CDATA[SoBatista]]></dc:creator>
            <pubDate>Tue, 05 May 2026 09:26:25 GMT</pubDate>
            <atom:updated>2026-05-05T09:26:25.420Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Beyond the Tool Trap: Moving from Automation to Adversarial Thinking]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@arunsridhar.e98/beyond-the-tool-trap-moving-from-automation-to-adversarial-thinking-26e7eb5357e0?source=rss------pentesting-5"><img src="https://cdn-images-1.medium.com/max/780/1*X99rcqbnxjr6Rha9G5tW3A.jpeg" width="780"></a></p><p class="medium-feed-snippet">When I first transitioned from full-stack development into the world of cybersecurity, I was convinced that expertise was measured by the&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@arunsridhar.e98/beyond-the-tool-trap-moving-from-automation-to-adversarial-thinking-26e7eb5357e0?source=rss------pentesting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@arunsridhar.e98/beyond-the-tool-trap-moving-from-automation-to-adversarial-thinking-26e7eb5357e0?source=rss------pentesting-5</link>
            <guid isPermaLink="false">https://medium.com/p/26e7eb5357e0</guid>
            <category><![CDATA[cyber-security-awareness]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[pentesting]]></category>
            <dc:creator><![CDATA[Arunsridhar E]]></dc:creator>
            <pubDate>Tue, 05 May 2026 02:56:01 GMT</pubDate>
            <atom:updated>2026-05-05T02:56:01.270Z</atom:updated>
        </item>
    </channel>
</rss>