
Business logic vulnerabilities
What are Business Logic Vulnerabilities? In today’s world, where hackers are becoming more sophisticated with each passing day, penetration testers

What are Business Logic Vulnerabilities? In today’s world, where hackers are becoming more sophisticated with each passing day, penetration testers

Credentials Stealing Ever wondered how your credentials can be stolen from SSO (Single Sign-On)? How a legit-looking windows popup can

This post covers the following areas of CVE-2021-40444 Microsoft MSHTML Remote Code Execution Exploit About Working Requirements Exploit Getting Reverse

Server-Side Request Forgery (SSRF) means a server makes requests for us even though it shouldn’t. You can exploit SSRF in