PinnedPublished inSystem WeaknessIDOR: User Information DisclosureIn a recent security assessment in one of the cryptocurrency platform API, a vulnerability was discovered that exposes user information…Oct 18, 2024A response icon1Oct 18, 2024A response icon1
Published inSystem WeaknessIDOR chained with JWT token cracking leads to edit, view and deletion of 160000 user accounts.Oct 13, 2024A response icon4Oct 13, 2024A response icon4
Bug Bounty Recon (Part-4)Waybackurls And Discovering ParametersJun 19, 2023A response icon4Jun 19, 2023A response icon4
Bug Bounty Recon (Part-3)Content Discovery using FFUFJun 11, 2023A response icon4Jun 11, 2023A response icon4
Bug Bounty Recon (Part-2)Previous Part: https://aswinthambipanik07.medium.com/bug-bounty-recon-part-1-dad7f86d1b0fJun 5, 2023A response icon4Jun 5, 2023A response icon4
Hunting on memcached servers: Dumping dataWhat is a Memcached server?May 10, 2023A response icon1May 10, 2023A response icon1