Rahul HoysalaTryHackMe — Advent of Cyber 2024: Day 5 WriteupWelcome to Day 5 of THM’s AoC 2024! Today, we’re going to be having an interesting challenge: to exploit an XXE vulnerability on a web…16h ago
InInfoSec Write-upsbyTide FoundationReimagining cybersecurity for platform developersCybersecurity is broken. Let’s fix it!Oct 252
Ahmed HusseinHow I found 4 IDORs in the same targetHello guys its me again! Today I will explain to you 4 IDORs I found in the same target and I’ll also tell you how I discovered them.Nov 235Nov 235
BerserkerHow Two Hardcoded Credentials Led To Payment System Takeover, Exposed 20,000 Credit Cards & Enabled…Introduction:1d ago1d ago
Dhabaleshwar DasThe $300 Journey from RFI to RCE that Changed EverythingThis story dates back to about three years ago, but it’s one of those incidents that stuck with me. So, I thought, why not share it as my…Nov 1720Nov 1720
Rahul HoysalaTryHackMe — Advent of Cyber 2024: Day 5 WriteupWelcome to Day 5 of THM’s AoC 2024! Today, we’re going to be having an interesting challenge: to exploit an XXE vulnerability on a web…16h ago
InInfoSec Write-upsbyTide FoundationReimagining cybersecurity for platform developersCybersecurity is broken. Let’s fix it!Oct 252
Ahmed HusseinHow I found 4 IDORs in the same targetHello guys its me again! Today I will explain to you 4 IDORs I found in the same target and I’ll also tell you how I discovered them.Nov 235
BerserkerHow Two Hardcoded Credentials Led To Payment System Takeover, Exposed 20,000 Credit Cards & Enabled…Introduction:1d ago
Dhabaleshwar DasThe $300 Journey from RFI to RCE that Changed EverythingThis story dates back to about three years ago, but it’s one of those incidents that stuck with me. So, I thought, why not share it as my…Nov 1720
Rahul HoysalaTryHackMe — Advent of Cyber 2024: Day 4 WriteupHello and welcome back to Day 4 of THM’s AoC 2024. Today, we are going to be having an interesting bit of a purple teaming activity —…1d ago1
Prof Bill Buchanan OBE FRSETowards Zero Trust and Attribute-Based EncryptionOverall, in cybersecurity, we need to realise that role-based access security (RBAC) is often not a sensible solution for protecting data…Nov 163