Open in app

Sign in

Write

Sign in

secureITmania
secureITmania

840 followers

Home

Lists

About

Pinned
entersoftsecurity

Published in

entersoftsecurity

Weird “Subdomain Take Over” pattern of Amazon S3

Even though you have an idea on the subdomain takeover via AWS S3. In this write-up, I will show the non-typical way of S3 subdomain

May 31, 2020
Weird “Subdomain Take Over” pattern of  Amazon S3
Weird “Subdomain Take Over” pattern of  Amazon S3
May 31, 2020

S3 bucket enumeration simplified.

A web-based tool to scan the S3 bucket misconfiguration.

May 29, 2024
1
S3 bucket enumeration simplified.
S3 bucket enumeration simplified.
May 29, 2024
1

Never use the GET method for Sensitive Actions in Web App: Ft. CSRF

The Limitation of Cookie’s “SameSite: Lax” Security

Apr 28, 2024
1
Never use the GET method for Sensitive Actions in Web App: Ft. CSRF
Never use the GET method for Sensitive Actions in Web App: Ft. CSRF
Apr 28, 2024
1

Why Appropriate Content-Type Header Matters In REST API Security: Ft. JSON XSS

Let's Explore the Content-Type Header Role in API Security

Oct 15, 2023
Why Appropriate Content-Type Header Matters In REST API Security: Ft. JSON XSS
Why Appropriate Content-Type Header Matters In REST API Security: Ft. JSON XSS
Oct 15, 2023

The Art of Identifying X$$ & WAF Bypass Fuzzing Technique

A smart way to hunt Cross-Site Scripting vulnerability

Sep 30, 2023
The Art of Identifying X$$ & WAF Bypass Fuzzing Technique
The Art of Identifying X$$ & WAF Bypass Fuzzing Technique
Sep 30, 2023

Learn and Earn with the Most Common Unsecured Methods of OTP Bypass Techniques: Unpacking the…

Discover the ultimate guide for bug bounty hunters to detect sneaky OTP validation vulnerabilities!

Jul 11, 2023
Learn and Earn with the Most Common Unsecured Methods of OTP Bypass Techniques: Unpacking the…
Learn and Earn with the Most Common Unsecured Methods of OTP Bypass Techniques: Unpacking the…
Jul 11, 2023

The Importance of Checking User-Agent Header Dependency in Penetration Testing

Never ever give a chance to leave a bug to automated scanners.

Jun 2, 2023
The Importance of Checking User-Agent Header Dependency in Penetration Testing
The Importance of Checking User-Agent Header Dependency in Penetration Testing
Jun 2, 2023

Secure docker instance with basic Authentication

Nginx reverse proxy with Basic Authentication

Jul 1, 2022
Secure docker instance with basic Authentication
Secure docker instance with basic Authentication
Jul 1, 2022

Never leave this tip while you hunting Broken Access Control

A special Bug-Bounty tip for Bug hunters and Pen-testers

Nov 12, 2021
Never leave this tip while you hunting Broken Access Control
Never leave this tip while you hunting Broken Access Control
Nov 12, 2021
entersoftsecurity

Published in

entersoftsecurity

Deploy a personal VPN in Linode

A better way to take control of your online privacy

Jul 11, 2021
Deploy a personal VPN in Linode
Deploy a personal VPN in Linode
Jul 11, 2021
secureITmania

secureITmania

840 followers

https://www.youtube.com/@secureitmania/videos | https://www.buymeacoffee.com/secureitmania |https://secureitmania.in| https://t.me/secureitmania_world

Following
  • Rajeev

    Rajeev

  • Lokesh Kumar

    Lokesh Kumar

  • ecstasy

    ecstasy

  • Thexssrat

    Thexssrat

See all (76)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech