Naveen JAPI Security Misconfiguration Leads to tons of PII data LeakageIntroductionJul 1, 2021Jul 1, 2021
Naveen JInsecure DeserializationA pentester’s guide to insecure deserializationJun 9, 2021Jun 9, 2021
Naveen JTime-Based SQL Injection to Dumping the DatabaseDumping the whole databaseMay 19, 2021May 19, 2021
Naveen JinSystem WeaknessBulk Subdomains Take OverTaking Over more than 20+ subdomainsMay 8, 2021May 8, 2021
Naveen JinSystem WeaknessRemote Code Execution due to unrestricted file uploadRemote Code ExecutionApr 7, 2021Apr 7, 2021
Naveen JJailbreaking iPhone and Dynamic Analysis Lab SetupJailbreaking iPhone 6 with software version 12.5.1 and setting up the tools…Mar 10, 2021Mar 10, 2021
Naveen JRemote Code Execution due to unrestricted file uploadRemote Code ExecutionMar 5, 2021Mar 5, 2021
Naveen JAccount Take Over by Response ManipulationHi all I hope everyone is doing well. This writeup is all about account take Over vulnerability by manipulating the login response.Feb 17, 20211Feb 17, 20211
Naveen JRemote Code Execution due to Unrestricted File uploadRemote Code ExecutionFeb 14, 2021Feb 14, 2021
Naveen JAccount Take Over due to No rate limitingThe Story of Taking over tons of users AccountsFeb 11, 2021Feb 11, 2021