Why_is_programing_neccessary_for_pentesting

Well i got lots of questions from peoples that is it neccessary to learn programing to become a bug hunter,ethical hacker,pentester etc. in short i will use term “security resarcher” so, i decided to write that post to answer that questuions ..and though its my personal opinion everyone have their... [Read More]

Web_cahe_posioning_to_xss_and_ssrf

i don’t waste time by talking about myself …i gonna share my experience of a bug “web cache poisioning” in bug bounty as usually i was pentesting on private sites i saw there my paraminer shows an unkeyed url with secret url Before exploiting part i wanna share my thoughts... [Read More]

Authentication_token_bypass Leads Too_idor

here is the article how i was able to bypass authentication token and able to exploit idor and add any user to add events of website ..before coming on main topic that how i find the vulnerablity let me clear your core concepts about authorization tokens [Read More]

Why_is_programing_neccessary_for_pentesting

Well i got lots of questions from peoples that is it neccessary to learn programing to become a bug hunter,ethical hacker,pentester etc. in short i will use term “security resarcher” so, i decided to write that post to answer that questuions ..and though its my personal opinion everyone have their... [Read More]

Web_cahe_posioning_to_xss_and_ssrf

i don’t waste time by talking about myself …i gonna share my experience of a bug “web cache poisioning” in bug bounty as usually i was pentesting on private sites i saw there my paraminer shows an unkeyed url with secret url Before exploiting part i wanna share my thoughts... [Read More]

Authentication_token_bypass Leads Too_idor

here is the article how i was able to bypass authentication token and able to exploit idor and add any user to add events of website ..before coming on main topic that how i find the vulnerablity let me clear your core concepts about authorization tokens [Read More]