Webhook Exploitation to Compromise Users Data
The article is about the report on finding the vulnerability in an application and was able to compromise 3000+ user’s Webhook. I got invited to one of the private programs…
Cyber Security
The article is about the report on finding the vulnerability in an application and was able to compromise 3000+ user’s Webhook. I got invited to one of the private programs…
Cyber security researchers have newly discovered a cyber attack and warned that unauthenticated attackers are targeting the Kubernetes clusters to deploy crypto miners. Kubernetes is an open-source repository platform for…
On July 18, 2021, several news organizations across the world outburst a report that many governments are using the Pegasus spyware tool, developed by Israel cyberarms company NSO group, to…
Pegasus is a spyware hacking software suite basically used for the surveillance of individuals that can be secretly installed on mobile phones and other devices that run iOS and Android…
One of the biggest cyberattacks of the 21st century which was recently discovered that targeted US government organizations and companies. In fact, it is declared a global cybersecurity breach. Hackers…
This is the walk-through for vulnerable machine ROBOT VM. There are 3 flags present in this machine, our task is to get access into the machine and read those flags.…
This article explains the Exploitation of VM Typhoon 1.02 from vulnhub. This contains the steps from scanning to getting a normal user following with the post-exploitation and become a root…
This article describes the process of exploiting hackNos 3 target environment downloaded from Vulnhub. I have included all the necessary screenshots which will help you understand the methodology easily. Wherever…
This article describes the process of exploiting hackNos v2.1 target environment downloaded from Vulnhub. I have included all the necessary screenshots which will help you understand the methodology. Wherever needed…
This article is about the process of exploiting a target machine downloaded from the Vulnhub forum. I have added the required screenshots and described the process with simple statements. Do…