
How to Find Security Vulnerabilities in Cloud Computing
What is Cloud Security? Cloud security refers to the measures and practices that are used to protect data, applications, and infrastructure in cloud computing environments.
What is Cloud Security? Cloud security refers to the measures and practices that are used to protect data, applications, and infrastructure in cloud computing environments.
Hi everyone and welcome back on this new write-up. Today, I would like to talk about a vulnerability I found on some programs that allowed
WhoAmI: I am a twenty-year-old who has been in the bug bounty scene since 2018. Most of my time is on HackerOne, and I specialize
Today we are going Maidens Castle Tryhackme Walkthrough from tryhackme platform. User1.txt Hint: Find the different user. Keep enumerating. Footprint Nmap detects a Samba network
What are JWTs? JSON web tokens (JWTs) are a standardized format for sending cryptographically signed JSON data between systems. Theoretically, they can contain any kind
Opensource an easy rated linux machine which involved a flask application running in debug mode with an ability to upload files, having the .git folder
Tl;dr : a subdomain of tokopedia’s website is pointed to an expired Top-Level-Domain available to buy, so obviously I go ahead and buy it. Assalamualaikum
I mostly wanted to share this post not because it’s a novel and unique attack, but to show the thought process of attacking this particular
Hii hunters ! I’m again with another story. I love 2FA, not because it provide extra security. Because of satisfaction to bypass them. Stay tuned
Introduction In part 1 we compromised an account with multiple permissions, but no Administrator access. We found a potential role that would allow us to escalate privileges,