Pentester Lab Pro Subscription Giveaway

InfoSec Write-ups - Medium-- InfoSec Writeups’ first collaboration with PentesterLabHello folks!We are super excited to announce that Infosec Write-ups is conducting its first-ever competition in collaboration with PentesterLab — the biggest and best online resource that makes learning web hacking easier!The winners will receive 1-month PentesterLab Pro Lab Coupons, using which they can access all the pro labs … Continue reading Pentester Lab Pro Subscription Giveaway

Increasing XSS impact using XSScope

InfoSec Write-ups - Medium-- During Bug Hunting, everyone aims for triggering the “1” alert. However, if you want to escalate your impact of XSS, now you can do this easily by using XSScope.What is XSScope?What is XSScope? XSScope is an advanced XSS payload generator platform for Client-Side attacks and also with an aim of increaing the impact … Continue reading Increasing XSS impact using XSScope

Exploiting AWS IAM permissions for total cloud compromise: a real world example (part 2/2)

InfoSec Write-ups - Medium-- IntroductionIn part 1 we compromised an account with multiple permissions, but no Administrator access. We found a potential role that would allow us to escalate privileges, following one of the methods in Rhinosecuritylab’s post. Briefly explained, we’ll try to create an instance and attach to it a privileged role at creation … Continue reading Exploiting AWS IAM permissions for total cloud compromise: a real world example (part 2/2)

Exploiting fine-grained AWS IAM permissions for total cloud compromise: a real world example (part…

InfoSec Write-ups - Medium-- Exploiting fine-grained AWS IAM permissions for total cloud compromise: a real world example (part 1/2)IntroductionThis is a real case study of how to enumerate and use IAM permissions to your advantage. I strongly suggest you read my previous article on how IAM permissions work. It’s long, but necessary to understand most of … Continue reading Exploiting fine-grained AWS IAM permissions for total cloud compromise: a real world example (part…

Jailbreaking iOS without a Mac (1/4): The Plan

InfoSec Write-ups - Medium-- Installing an unsigned iOS app (what is the prerequisite of jailbreaking) using Linux with (semi-)legitimate tools.Consider the following situation: we have a factory-installed iOS device (iPhone 5S here) with a recent iOS version (12.4.8) and we want to jailbreak it. We have a Linux desktop (Arch Linux in the following guide), … Continue reading Jailbreaking iOS without a Mac (1/4): The Plan

Taking down the SSO, Account Takeover in 3 websites of Kolesa due to Insecure JSONP Call

InfoSec Write-ups - Medium-- Taking down the SSO, Account Takeover in the Websites of Kolesa due to Insecure JSONP CallHello, this post is about how I could take-over any account of Kolesa’s websites using Single Sign-On. There was an insecure JSONP call which could break the security of the entire SSO mechanism.What is JSONP?JSONP is a method … Continue reading Taking down the SSO, Account Takeover in 3 websites of Kolesa due to Insecure JSONP Call

Privilege Escalation via Account Takeover on NodeBB Forum Software (512$)

InfoSec Write-ups - Medium-- Privilege Escalation via Account Takeover on NodeBB Forum Software — Bug Bounty (512$)Hello Guys !I hope you all doing well. ✌️About a month ago, I told you that I found an Account Takeover vulnerability in a web application as in the screenshot below. With the new patch coming to the web application with the vulnerability, I … Continue reading Privilege Escalation via Account Takeover on NodeBB Forum Software (512$)