File Upload Vulnerabilities
File upload features are a goldmine during pentests. A misconfigured upload endpoint can lead directly to Remote Code Execution. This guide covers every filter …
Writeups, research, and technical notes from a Senior Security Consultant and competitive CTF player based in Singapore.
File upload features are a goldmine during pentests. A misconfigured upload endpoint can lead directly to Remote Code Execution. This guide covers every filter …
HTTP request smuggling exploits discrepancies between how a front-end proxy and a back-end server parse HTTP request boundaries. The result is that you can “smu…
Subdomain takeover occurs when a subdomain’s DNS record points to an external service that is no longer claimed by the organization. An attacker claims the uncl…
Authentication failures consistently rank in the OWASP Top 10. This post covers the most common and impactful bypass techniques you’ll encounter in modern web a…
SSL pinning prevents MITM interception by verifying the server’s certificate against a known value embedded in the app. This guide covers every common pinning i…
NoSQL databases don’t use SQL, but they’re still injectable. MongoDB is the most common target — its query operators can be injected through JSON or URL paramet…
ffuf (Fuzz Faster U Fool) is the fastest web fuzzer available. This guide covers every use case from basic directory brute-forcing to advanced parameter discove…
CSRF tricks a victim’s browser into making authenticated requests to another site without their knowledge. It’s most valuable when combined with state-changing …
Server-Side Request Forgery is one of the most versatile vulnerabilities in modern web applications. When a server fetches a URL you control, you gain a proxy i…
Static analysis of an APK can reveal API keys, backend endpoints, hardcoded credentials, cryptographic weaknesses, and insecure configurations — all before you …