Bean Validation To Remote Code ExecutionIn this blog post we will talk about a Java Specific bug that are often overlooked during pentest , which can give us a code execution if…Apr 13Apr 13
Published inInfoSec Write-upsWeird GPG BypassWill talk about a technique of GPG Bypass ,I discovered during one of the pentest i was doing and how i was able to use it to bypass the…Nov 12, 2023Nov 12, 2023
Published inSystem WeaknessInsecure Deserialisation(JAVA)In this blog post we will learn what is Deserialisation .Why we need it .How it works and how can we abuse it.All in the context of java.Mar 31, 2022Mar 31, 2022
Published inSystem WeaknessHacking JWTThis article is all about pentesting JWT. You can practice all of these techniques on vulnerable target availabe at burp Suite webacademy…Feb 27, 20223Feb 27, 20223
ValentineThis Box requires exploiting a memory corruption bug to gather information that can be used in the further movement to get the initial…Jan 24, 2022Jan 24, 2022