Write-ups

Finding and exploiting an unused API endpoint

PortSwigger- Finding And Exploiting An Unused API Endpoint

All web applications use an Application Programming Interface (API) which is also vulnerable if exploited by an attacker. So as a penetration tester, we should know how to identify and exploit these API-related vulnerabilities. In this blog, we will understand the complete process which starts from identifying API endpoints, supported HTTP methods, and content types.

PortSwigger- Finding And Exploiting An Unused API Endpoint Read More »

Whats Your Name Tryhackme walkthrough

TryHackMe- Whats Your Name?

Hello Folks, In this blog, we are going to solve a challenge that will test our client-side exploitation skills. The name of this challenge is “Whats Your Name?” and it is available on the TryHackMe platform. This CTF is only available to TryHackMe subscribers. We will be exploring some web application vulnerabilities like Cross-site Scripting

TryHackMe- Whats Your Name? Read More »

BoardLight hackthebox writeup

HackTheBox- BoardLight

Hello Folks, In this blog, we are going to discuss as well as solve another easy machine of the HackTheBox platform named “BoardLight”. This machine is based on the Linux operating system and will help us understand how important it is to update the applications running on servers. Let’s begin the penetration testing process. You

HackTheBox- BoardLight Read More »

Blind SQL Injection

PortSwigger- Blind-Based SQL Injection- I

In this blog, we will understand one of the most identifiable and difficult types of SQL Injection vulnerability. It is Blind SQL Injection. We will learn about the same using PortSwigger platform. Let’s begin the blog and understand the meaning of blind SQL injection vulnerability. Blind SQL injection vulnerabilities are those where we send a malicious SQL query to the server but we don’t receive any direct output in the response.

PortSwigger- Blind-Based SQL Injection- I Read More »

Scroll to Top