Authentication and Authorization Attacks – Part 2
Identify the weaknesses
before they reach production,
Cause IDOR vulnerabilities
Don’t need no introduction.
If a user somehow
can access the pages that’s restricted,
This may lead to the elevation
of that user’s privilege.
Authentication and Authorization Attacks – Part 1
Authentication & Authorization Attacks: Part 112October, 2023Practical Bug Bounty: Authentication & Authorization Attacks- Part 1Photo by Markus Spiske Everything, and we mean absolutely everything on this blog that surrounds the term “hacking” is meant for...
Grinding Towards the PNPT: Windows Privilege Escalation Part 1
Grinding towards the PNPT: Windows Privilege Escalation- Part 131March, 2023Grinding towards the PNPT: Windows Escalation- Part 1Photo by Johny Vino Greetings, Community! In this post we are still traveling the path to reach the goal that we had set earlier last year:...
Grinding Towards the PNPT: Attacking Black Pearl
Grinding towards the PNPT: Attacking Black Pearl26January, 2023Grinding towards the PNPT: Attacking Black Pearl.Photo Creds - Barry Weatherall In this post we are still traveling the path to reach the goal that we had set earlier last year: To obtain the Practical...
Grinding Towards the PNPT: Attacking Dev
Grinding towards the PNPT: Attacking Dev9December, 2022Grinding towards the PNPT: Attacking DevPhoto Creds - Hannah Xu In this post we are still traveling the path to reach the goal that we had set earlier this year: To obtain the Practical Network Penetration Tester...