Feb 25How to create a Vulnerable BoxWith this blog, I will teach you how to make an easy vulnerable box from 0 First Step First, we need to decide to install any iso file image. We can install both debian and ubuntu. As you prefer. You can install this image in VirtualBox and boot your machine. Second Step The second…Ctf4 min read
Feb 22Paper HackTheBox Write-UpEasy box made by Jin NMAP ┌──(root kali)-[~/Desktop] └─# nmap -sS -A -sC -sV -p- -T410.10.11.143 Starting Nmap 7.91 ( https://nmap.org ) at 2022-02-22 12:31 EST Nmap scan report for 10.10.11.143 Host is up (0.24s latency). Not shown: 65532 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh…Hackthebox7 min read
Feb 21eCPTX Exam Review by 0xJineLearnSecurity Certified Penetration Tester eXtreme Summary Hello Folks, some times ago i decided to take eLearnSecurity Certified Penetration Tester eXtreme (eCPTX) exam. Knowing I am going against something really difficult. Advanced Penetration Testing — Course The eCPTX exam is based on the Advanced Penetration Testing course under the INE flag. …Hacking4 min read
Nov 4, 2021New XSS Bypass CLOUDFLARE + Filters.Hello Folks, i want to tell my story of this type of XSS. Payload: "><svg+svg+svg\/\/On+OnLoAd=confirm(1)> Why this payload work? …In my case, i was in front of an application that my payload was closed by Unicode Character. Example: "><svg/onload=alert(1)> This Payload was Blocked: “><sv\u01234\g\u01235/on\u01236load=confirm(1)> I This case i tryied to use…2 min read
Aug 29, 2021Bug Bounty: “My Remote Code Execution”First Step: In first, i found my subdomain using Amass tool. After i used ffuf tool for brute force the directories and i found an Improper access control: https://subdomain.xxx.com/phppgadmin There was a page with need to submit credentials, user and password. I tried some combination of user/password with googling, and thanks to…3 min read
Apr 18, 2021Bypass Forbidden Error in SQLI531Jawwad HussainHello, nice writeup, can you send me which hackbar are you using please? Thank you my friendHello, nice writeup, can you send me which hackbar are you using please? Thank you my friend1 min readHello, nice writeup, can you send me which hackbar are you using please? Thank you my friend----1
Mar 23, 2021Bug Bounty: Story of a Not Applicable SQL Injection worth 15,000$Note: I will not mention the companies, for reasons of privacy and confidentiality. What is SQL Injection? A SQL Injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database…4 min read