PinnedLatest Cybersecurity News, Vulnerabilities, and Technical AnalysisStay updated with the latest cybersecurity news, discover vulnerabilities, and explore technical analysis in our lab articles on…Dec 25, 2024Dec 25, 2024
Published inInfoSec Write-upsBlind SQL Injection in Oracle Database: Exfiltrating Data with Burp Collaborator — SQL Injection…[Write-up] Blind SQL Injection with Out-of-Band Data Exfiltration.Mar 2Mar 2
Published inInfoSec Write-upsHow to Exploit a Hidden GraphQL Endpoint by Changing POST to GET Request — GraphQL API Labs[Write-up] Finding a Hidden GraphQL Endpoint.Feb 17Feb 17
Published inInfoSec Write-upsBroken Brute-Force Protection: How to Bypass Rate Limiting in a Single Request — Authentication…[Write-up] Broken Brute-force Protection, Multiple Credentials per Request.Feb 12Feb 12
Published inInfoSec Write-upsStored XSS into Onclick Event: Bypassing Angle Brackets, Double Quotes, and Escaped Characters —…[Write-up] Stored XSS into Onclick Event with Angle Brackets and Double Quotes HTML-encoded and Single Quotes and Backslash Escaped.Feb 10Feb 10
Exploiting Web Cache Poisoning with Multiple Headers: A Practical Guide Using Param Miner — Web…[Write-up] Web Cache Poisoning with Multiple Headers.Feb 8Feb 8
How to Exploit Web Cache Poisoning with an Unkeyed Header Using Param Miner — Web Cache…[Write-up] Web Cache Poisoning with an Unkeyed Header.Feb 7Feb 7
[A Practical Guide] Exploiting SSRF with Filter Bypass via Open Redirection — SSRF Labs[Write-up] SSRF with Filter Bypass via Open Redirection Vulnerability.Feb 4Feb 4
Blind SSRF with Out-of-Band Detection: Step-by-Step Exploitation & Prevention — SSRF Labs[Write-up] Blind Server-Side Request Forgery (SSRF) with Out-of-band Detection.Feb 31Feb 31
Bypassed Access Control Using a Simple Method-Based Request Trick — Access Control Labs[Write-up] Method-based Access Control Can Be Circumvented.Jan 24Jan 24