Open in app

Sign In

Write

Sign In

secureITmania
secureITmania

588 Followers

Home

Lists

About

Published in

entersoftsecurity

·Pinned

Weird “Subdomain Take Over” pattern of Amazon S3

Thanks for huge response to my previous write-ups. Recently I participated in a Bug Bounty program and I have found “Sub-domain takeover” issue by leveraging the Amazon S3 hosting service. Even though you have an idea on the subdomain takeover via AWS S3. In this write-up, I will show the…

Hacking

5 min read

Weird “Subdomain Take Over” pattern of  Amazon S3
Weird “Subdomain Take Over” pattern of  Amazon S3
Hacking

5 min read


Jul 11

Learn and Earn with the Most Common Unsecured Methods of OTP Bypass Techniques: Unpacking the Pitfalls

Discover the ultimate guide for bug bounty hunters to detect sneaky OTP validation vulnerabilities! — Introduction: As the digital world expands, so does the importance of cybersecurity. One Time Passwords (OTP) have become increasingly popular in the realm of authentication. They are known for providing an extra layer of security, making it difficult for hackers to gain unauthorized access. However, if not properly implemented, OTP validation…

Hacking

4 min read

Learn and Earn with the Most Common Unsecured Methods of OTP Bypass Techniques: Unpacking the…
Learn and Earn with the Most Common Unsecured Methods of OTP Bypass Techniques: Unpacking the…
Hacking

4 min read


Jun 2

The Importance of Checking User-Agent Header Dependency in Penetration Testing

Never ever give a chance to leave a bug to automated scanners. — Introduction: In the world of penetration testing, it is crucial to employ the right tools and methodologies to uncover vulnerabilities in a system. However, blindly relying on security tools without considering certain factors can lead to false positive results, wasting valuable time and resources. One such factor that requires careful analysis…

Bug Bounty

3 min read

The Importance of Checking User-Agent Header Dependency in Penetration Testing
The Importance of Checking User-Agent Header Dependency in Penetration Testing
Bug Bounty

3 min read


Jul 1, 2022

Secure docker instance with basic Authentication

Nginx reverse proxy with Basic Authentication — Introduction: Recently, I faced a challenge to deploy a docker web application with basic authentication. Instead of modifying the docker web application, I deployed the docker instance behind the Nginx reverse proxy with Basic Auth. …

Docker

2 min read

Secure docker instance with basic Authentication
Secure docker instance with basic Authentication
Docker

2 min read


Nov 12, 2021

Never leave this tip while you hunting Broken Access Control

A special Bug-Bounty tip for Bug hunters and Pen-testers — If you already know about Broken Access Control weakness. Please skip explanation and go to the “Observation” section. What is Broken Access Control Broken Access Control is a type of weakness in the software program or application. …

Hacking

2 min read

Never leave this tip while you hunting Broken Access Control
Never leave this tip while you hunting Broken Access Control
Hacking

2 min read


Published in

entersoftsecurity

·Jul 11, 2021

Deploy a personal VPN in Linode

A better way to take control of your online privacy — Internet Privacy Day to day the technology is growing rapidly. In this technological world, we are becoming the products of giant companies. We are monitored by these giant companies while we are surfing the internet. Using our search content stats on multiple platforms and combined them with ML technology they are influencing…

Productivity

4 min read

Deploy a personal VPN in Linode
Deploy a personal VPN in Linode
Productivity

4 min read


Published in

InfoSec Write-ups

·Jul 3, 2021

Genymotion+Xposed+Inspeckage

Android application dynamic analysis lab setup on windows — To perform the android application penetration testing we need a rooted android device. But it is not always safe to root our personal devices. So, I came with a solution and you to analyze the android application without an actual device. …

Android

5 min read

Genymotion+Xposed+Inspeckage
Genymotion+Xposed+Inspeckage
Android

5 min read


Mar 17, 2021

An unknown Linux secret that turned SSRF to OS Command injection

A weird approach to escalate the Server-Side Request Forgery — Thanks for huge response to my previous write-ups. Recently I have participated in a private program and I found an OS command injection. In this write-up, want share my experience, approach and the challenge I faced during the exploitation. What is SSRF: SSRF stands for Server-Side Request Forgery. SSRF is a kind of…

Hacking

3 min read

An unknown Linux secret that turned SSRF to OS Command injection
An unknown Linux secret that turned SSRF to OS Command injection
Hacking

3 min read


Published in

InfoSec Write-ups

·Feb 20, 2021

Let’s know How I have explored the buried secrets in Xamarin application

A new era in Android Reverse Engineering part-2 — In my previous write-up I explain the React Native reverse engineering technique. Again I have found a bug in Xamarin based application that was found by a different approach instead of old reverse engineering methodology. Introduction: Xamarin is a free and open source mobile app platform for building native and high-performance…

Cybersecurity

3 min read

Let’s know How I have explored the buried secrets in Xamarin application
Let’s know How I have explored the buried secrets in Xamarin application
Cybersecurity

3 min read


Published in

InfoSec Write-ups

·Jan 18, 2021

Let’s know How I have explored the buried secrets in React Native application

A new era in Android Reverse Engineering part-1 — Thanks for the huge response to my previous write-up. Recently I have found a bug regards to hard-coded credentials issue that was found by a different approach instead of old reverse engineering methodology. Introduction: React Native is a mobile application framework that is most commonly used to develop applications for Android…

Cybersecurity

3 min read

Let’s know How I have explored the buried secrets in React Native application
Let’s know How I have explored the buried secrets in React Native application
Cybersecurity

3 min read

secureITmania

secureITmania

588 Followers

https://www.buymeacoffee.com/secureitmania |blog.secureitmania.com| twitter @secureitmania |

Following
  • Sushmitha Katikitala

    Sushmitha Katikitala

  • Qwiklabs

    Qwiklabs

  • Vickie Li

    Vickie Li

  • Gökhan Güzelkokar

    Gökhan Güzelkokar

  • Rajeev

    Rajeev

See all (79)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams