Posts | Articles | Papers

The exploitation of a $$$$ SQL Injection Path Based

Paper

The exploitation of a $$$$ SQL Injection Path Based image
Here is how I exploited a unusual SQL Injection Path Based and got rewarded with bounty First of all, here are some sections that will be covered in this article, ┌───────────────Summary─────────...

How I g0t 4000$ for AWS Metadata Leak and Takeover $$

Paper

How I g0t 4000$ for AWS Metadata Leak and Takeover $$ image
Here is how I g0t $$ pwning AWS cloud of a bug bounty program at HackerOne First of all, we have some sections that will be covered in this article, ┌───────────────Summary────────────────┐ │ ...

ASN Recon | Recon wide scope targets

Paper

ASN Recon | Recon wide scope targets image
Coming Soon

Trending Tags