Mohammad ZaheriforVoorivex's Teamblog.voorivex.team·Mar 5, 2024$20,300 Bounties from a 200 Hour Hacking ChallengeBack to July 2023, Mohammad Nikouei and I decided to dedicate 100 hours to working on the public BB program on BugCrowd. We worked on the program part-time, spending 4 to 6 hours per day on it each. The program we chose was a famous and big company, ...Hossein Golzari and 1 other are discussing this2 people are discussing thisDiscuss·88 likes·7.5K readsbugbounty
Thomas Staceythomas.stacey.se·Mar 5, 2024Outpost24 Blog - Cross-site scripting attacks in action and how to protect against themWrite-up In this blog post, my colleagues at Outpost24 and I walkthrough some of the wilder Cross-Site Scripting attacks we've managed to conceive recently, and highlight the importance of considering context when crafting an impactful exploit.DiscussOutpost24
Ismail Harikismailharik.hashnode.dev·Jan 15, 2024A Step-by-Step Exploration of Spring Security 6Introduction: I'd like to start by letting you know that the inspiration behind this blog post comes from Ali Bouali. I want to sincerely thank Ali Bouali for initiating the sharing of this fantastic content. Your contribution is greatly appreciated...Discuss·141 readsSpring Security 6
Ishikha raoishikarao.hashnode.dev·Dec 14, 2023An Ultimate Guide to Web Application SecurityNowadays, web developers have to be vigilant as cyberattacks are on the rise. The security of their web app must be their top priority. The concept of web application security covers a large array of practices ranging from secure coding to penetratio...Discuss Web Application Security
Anjali Atawadkartechknowinfo.hashnode.dev·Nov 27, 2023The importance of a WAF in Modern Cyber Security : Shielding Against AttacksWhat is a Web Application Firewall (WAF)? A Web Application Firewall (WAF) is a security system that monitors, filters, and blocks HTTP traffic to and from a web application. It's designed to protect web applications from various attacks, such as cro...Discuss·228 reads Web Application Security
AyrixforVoorivex's Teamblog.voorivex.team·Nov 1, 2023$7000 Bounty on a Single Web ApplicationIntro Hello, my name is Amir Abbas, an 18-year-old web security enthusiast who goes by the username ImAyrix on most social networks. I have been actively involved in web application security for approximately a year and a half. At the moment, I am hu...Pravin M.D and 7 others are discussing this8 people are discussing thisDiscuss·122 likes·17.5K readsbugbounty
Haneunhanlee.hashnode.dev·Sep 10, 2023What is Session Fixation?Definition Session Fixation is one of the vulnerabilities that can occur in web application security. This vulnerability refers to a situation where an attacker gains access to an authenticated session by controlling the user's session identifier. Po...Discuss·70 readsCyber Securitycybersecurity
Haneunhanlee.hashnode.dev·Sep 2, 2023What is Directory IndexingDefinition Directory indexing vulnerability is one of the security vulnerabilities that can occur in web applications. This vulnerability can occur when a web application dynamically generates directory paths without validating user input. It is a vu...DiscussCyber Securitycybersecurity
Haneunhanlee.hashnode.dev·Aug 29, 2023LDAP Injection CheatsheetBasic LDAP Search Query LDAP (Lightweight Directory Access Protocol) is commonly used to retrieve specific information from directory services (e.g., Active Directory). The following is an example of an LDAP query for basic searches: (&(attribute1=va...DiscussCyber Security#cybersecurity
Haneunhanlee.hashnode.dev·Aug 29, 2023Operating System Commands by Http RequestDefinition Operating system command execution vulnerabilities are weaknesses that allow malicious users to execute malicious code or induce abnormal behavior within a system using the commands of the operating system. List of Vulnerability Trigger Po...DiscussCyber Security#cybersecurity