3 followers
I am on my journey to CPTS and OSCP, currently 70% on CPTS Pentest Role Path and 30% on CBBH bug bounty Role path. I take note on everything I learn, and treat it as my second brain.
1. Non-Recursive Path Traversal Filters Detailed Example Let's consider a vulnerable PHP script that attempts to filter ../ sequences: $language =...
1. Introduction Local File Inclusion (LFI) vulnerabilities are a common issue in web applications that dynamically load content based on user-supplied...
1. Introduction to File Inclusion Vulnerabilities 1.1 What are File Inclusion vulnerabilities? Explanation: File Inclusion vulns allow attacker to...
Introduction: In this blog post, we'll walk through the process of exploiting a blind XSS vulnerability to steal cookies from a victim's browser....
Frontend Prevention Techniques Input Validation with JavaScript Example: function validateEmail(email) { const re =...
1. Introduction 1.1. Types of Non-Persistent XSS Reflected XSS: Processed by the back-end server DOM-based XSS: Completely processed on the...