Accidental Observation to Critical IDOR

InfoSec Write-ups - Medium-- Insecure Direct Object Reference falls under the category for Broken Access Controls as per OWASP TOP 10 (2017 Edition). This issue usually occurs due to weak implementation of the application’s access control logics which links an identifier or an object to a particular asset say user_id parameter defines which user’s data … Continue reading Accidental Observation to Critical IDOR

Latest Google Chrome Update Addressed Actively Exploited Zero-Day

Latest Hacking News-- With the latest Chrome release, Google has addressed a serious zero-day vulnerability alongside other bugs. Update your browser at the Latest Google Chrome Update Addressed Actively Exploited Zero-Day on Latest Hacking News. View original article on Latest Hacking News

Accidental Observation to Critical IDOR

InfoSec Write-ups - Medium-- Insecure Direct Object Reference falls under the category for Broken Access Controls as per OWASP TOP 10 (2017 Edition). This issue usually occurs due to weak implementation of the application’s access control logics which links an identifier or an object to a particular asset say user_id parameter defines which user’s data … Continue reading Accidental Observation to Critical IDOR

Bypassing WAF to do Error-Based SQL Injection

InfoSec Write-ups - Medium-- Bypassing WAF to do advanced Error-Based SQL InjectionDuring penetration testing, I faced with a website which on this article I will name it as http://domain.comWhile browsing the website, I didn’t see any single Parameter, even though the website was built with PHP. I quit browsing and started to Google Dorking.Google Dorking to … Continue reading Bypassing WAF to do Error-Based SQL Injection