Recently, I faced a challenge to deploy a docker web application with basic authentication. Instead…
Tags: cloudsecurity, docker, Infosec, DevOps, ReverseProxy
In the world of penetration testing, it is crucial to employ the right tools and methodologies to u…
Tags: BugBounty, PenetrationTesting, Infosec, HackingTechnique
As the digital world expands, so does the importance of cybersecurity. One Time Passwords (OTP) hav…
Tags: SecureDevelopement, BugBounty, MFASecurity, OTPBypass, Infosec
Cross-site scripting (XSS) vulnerabilities are among the most common security issues in web applica…
Tags: XSS, WAFBypass, WAF, BugBounty, Infosec, Cross-Site Scripting
With the introduction of the default “Samesite: Lax” feature, developers can now enhance the securi…
Tags: SecureDevelopement, CSRF, BugBounty, BrowserSecurity, Infosec
When conducting bug hunting and penetration testing, you might come across S3 bucket endpoints and …
Tags: AWS, Cloudsecurity, S3Bucket, BugBounty, Misconfiguration
Before diving into the specifics of the Content-Type header, let’s quickly recap what REST APIs are…
Tags: APISecurity, XSS, BugBounty, API, BugBounty
Thanks for huge response to my previous write-ups. Recently I participated in a Bug Bounty program …
Tags: cloudsecurity, aws, DNS, BugBounty