How to Attack Web Applications with Burp Suite & SQL Injection

Null Byte « WonderHowTo-- Web applications are becoming more and more popular, replacing traditional desktop programs at an accelerated rate. With all these new apps out on the web comes various security implications associated with being connected to the internet where anyone can poke and prod at them. One of the simplest, yet the most … Continue reading How to Attack Web Applications with Burp Suite & SQL Injection

PII Leakage via IDOR + Weak PasswordReset = Full Account Takeover

InfoSec Write-ups - Medium-- Hello Hunters, this is a quick write up on one of my recent findings on a bug bounty program. Before jumping into the vulnerability, let us get familiarized with few terms.What is PII Leakage?Personally identifiable information (PII) is any data that could potentially identify a specific individual, such as username,userID or any other … Continue reading PII Leakage via IDOR + Weak PasswordReset = Full Account Takeover

How I earned $500 from Google – Flaw in Authentication

InfoSec Write-ups - Medium-- How I earned $500 from Google - Flaw in AuthenticationHello Everyone!This is my first writeup.Today I will share the write-up of my first accepted bug in Google, Which is in “Google Cloud Partner Advantage Portal” where I was able to modify personal details for victim account via Broken Authentication.What does “broken authentication” … Continue reading How I earned $500 from Google – Flaw in Authentication

FinSpy Spyware for Mac and Linux OS Targets Egyptian Organisations

The Hacker News-- Amnesty International today exposed details of a new surveillance campaign that targeted Egyptian civil society organizations with previously undisclosed versions of FinSpy spyware designed to target Linux and macOS systems. Developed by a German company, FinSpy is extremely powerful spying software that is being sold as a legal law enforcement tool to … Continue reading FinSpy Spyware for Mac and Linux OS Targets Egyptian Organisations

Microsoft Windows XP Source Code Reportedly Leaked Online

The Hacker News-- Microsoft's long-lived operating system Windows XP—that still powers over 1% of all laptops and desktop computers worldwide—has had its source code leaked online, allegedly, along with Windows Server 2003. Yes, you heard that right. The source code for Microsoft's 19-year-old operating system was published as a torrent file on notorious bulletin board … Continue reading Microsoft Windows XP Source Code Reportedly Leaked Online

Fortinet VPN with Default Settings Leave 200,000 Businesses Open to Hackers

The Hacker News-- As the pandemic continues to accelerate the shift towards working from home, a slew of digital threats have capitalized on the health concern to exploit weaknesses in the remote work infrastructure and carry out malicious attacks. Now according to network security platform provider SAM Seamless Network, over 200,000 businesses that have deployed the Fortigate VPN … Continue reading Fortinet VPN with Default Settings Leave 200,000 Businesses Open to Hackers

Business Logic Flaw in Google Acquisition! (Hall Of Fame)

InfoSec Write-ups - Medium-- Always Try Harder! Because It’s Google!Hi,I would like to thank all the Bug Hunters for their tedious effort in improving internet security and reaching out to read my little GOOGLE-Bug Hunting story and my experience on achieving GOOGLE-Hall Of Fame!I had started my Bug Hunting journey about 3 months ago, for the first … Continue reading Business Logic Flaw in Google Acquisition! (Hall Of Fame)

Become an In-Demand Ethical Hacker with This $15 CompTIA Course

Null Byte « WonderHowTo-- If you're interested in joining the increasingly popular and lucrative world of ethical or "white hat" hacking, you're far from alone. More and more coding and programming pros are turning to this field thanks to the high pay, countless opportunities, and exciting work environment. But this means that if you want … Continue reading Become an In-Demand Ethical Hacker with This $15 CompTIA Course