Rafshanzani SuhadainMII Cyber Security Consulting ServicesJavaScript Analysis: Identifying and Exploiting Web WeaknessesIn this article, I will focus on vulnerabilities related to Access Control. I will demonstrate how to utilize the JavaScript code loaded by…5d ago
Esmail Saied (0xSp1DeR)BAC leads to full takeover of any store within the organisationHello everyone, I’m Esmail and this is my first write-up, so today i’m gonna talk about one of the most interesting vulnerabilities I've…Mar 56
Joseph TadesseBOLA: Broken Object Level AuthorizationHey there! Today, we’re diving into an essential concept in cybersecurity: Broken Object Level Authorization (BOLA).Sep 10Sep 10
0x3adwyFrom a Single Link to Full Account Takeover: How I Hacked an E-Commerce Platform with One Click!Hello hackers 🐱💻Sep 3Sep 3
YoKo KhoinHakTrak Cybersecurity SquadUnderstanding Stealer Logs and Its Role in Security Testing — Part 1A Thorough Exploration of Stealer Logs: What, How, and Case StudyAug 301Aug 301
Rafshanzani SuhadainMII Cyber Security Consulting ServicesJavaScript Analysis: Identifying and Exploiting Web WeaknessesIn this article, I will focus on vulnerabilities related to Access Control. I will demonstrate how to utilize the JavaScript code loaded by…5d ago
Esmail Saied (0xSp1DeR)BAC leads to full takeover of any store within the organisationHello everyone, I’m Esmail and this is my first write-up, so today i’m gonna talk about one of the most interesting vulnerabilities I've…Mar 56
Joseph TadesseBOLA: Broken Object Level AuthorizationHey there! Today, we’re diving into an essential concept in cybersecurity: Broken Object Level Authorization (BOLA).Sep 10
0x3adwyFrom a Single Link to Full Account Takeover: How I Hacked an E-Commerce Platform with One Click!Hello hackers 🐱💻Sep 3
YoKo KhoinHakTrak Cybersecurity SquadUnderstanding Stealer Logs and Its Role in Security Testing — Part 1A Thorough Exploration of Stealer Logs: What, How, and Case StudyAug 301
Raviteja MureboinaBroken Access Control VulnerabilityAccess control acts as the guardian of your web application, ensuring users stay within their assigned permissions. When access control…Jun 13