PinnedAswin Thambi PanikulangarainSystem WeaknessIDOR: User Information DisclosureIn a recent security assessment in one of the cryptocurrency platform API, a vulnerability was discovered that exposes user information…Oct 181Oct 181
Aswin Thambi PanikulangarainSystem WeaknessIDOR chained with JWT token cracking leads to edit, view and deletion of 160000 user accounts.Oct 134Oct 134
Aswin Thambi PanikulangaraBug Bounty Recon (Part-4)Waybackurls And Discovering ParametersJun 19, 20234Jun 19, 20234
Aswin Thambi PanikulangaraBug Bounty Recon (Part-3)Content Discovery using FFUFJun 11, 20234Jun 11, 20234
Aswin Thambi PanikulangaraBug Bounty Recon (Part-2)Previous Part: https://aswinthambipanik07.medium.com/bug-bounty-recon-part-1-dad7f86d1b0fJun 5, 20234Jun 5, 20234
Aswin Thambi PanikulangaraHunting on memcached servers: Dumping dataWhat is a Memcached server?May 10, 20231May 10, 20231