Finding and exploiting SSRF
This post describes how to find SSRF vulnerabilities, exploit them and even bypass mitigations.
Continue ReadingThis post describes how to find SSRF vulnerabilities, exploit them and even bypass mitigations.
Continue ReadingThis post describes my experience with the PEN-300 course and OSEP exam.
Continue ReadingWrite-up of a stored XSS delivered via Syslog.
Continue ReadingWrite-up of an user enumeration vulnerability using a non-administrator account which impacts Harbor version <1.9.3.
Continue Reading