blog.redtrib3.inJWT misconfiguration leads to zero-click account takeover and PII exposure Recently I came across a relatively lesser known bug bounty platform and decided to hunt on it. While testing the program, I discovered that its JWT-based authentication could be manipulated to gain u14h ago·5 min read
blog.redtrib3.inReact2shell for dummiesIf you prefer to read this blog in a static website, I've got the same content over at redtrib3.bearblog.dev. There has been a lot off fuzz lately about this new vulnerability in React and NextJS. All of this seems to be quiet confusing at first but...Dec 26, 2025·9 min read
blog.redtrib3.inCloudSEK CTF 2025 WriteupIntroduction I secured first place in the CloudSEK Hiring CTF held in August, 2025. The competition involved 5 challenges of increasing difficulty placed as levels. In this writeup, I’ll outline my methods and thought process. TL;DR Found a google ...Aug 26, 2025·10 min read
blog.redtrib3.inThreat Hunting Simulator: Health Hazard - TryHackMe writeupThis writeup covers the new Threat Hunting simulator room ‘Health Hazard’ rated Easy from Tryhackme. At a high level, the challenge involved going through a splunk log to trace out the attack path, we have all the information needed to complete the c...Jul 27, 2025·9 min read
blog.redtrib3.inBuilding a Wazuh Lab from ScratchIn this writeup, I’ll be setting up a wazuh server - An Endpoint detection and response (EDR) tool that monitor devices for activity that could indicate a threat. I’ll be doing that in an Active directory environment containing 1 Domain controller an...Jul 11, 2025·18 min read