Published inInfoSec Write-upsExposing a Data Leak Vulnerability: My Journey to DiscoveryHow I Uncovered Sensitive Information and Contributed to Enhanced Cybersecurity6d ago6d ago
Published inInfoSec Write-upsUnderstanding 403 Bypass: A Critical Vulnerability in Web Application SecurityUnderstanding and Defending Against the 403 BypassApr 25Apr 25
Published inInfoSec Write-upsFrom Zero to Hero: A Beginner’s Guide to Programming MasteryUnlocking the Path to Programming ExcellenceOct 21, 2023Oct 21, 2023
Published inInfoSec Write-upsThe Ultimate Guide to Bug Bounty Hunting: Learn How to Find and Report VulnerabilitiesLearn How to Find and Report Vulnerabilities in 2023Sep 6, 2023Sep 6, 2023
Published inInfoSec Write-upsRevealing a Security Flaw: How I Discovered a Data Leak.TLDR; Discovered a programming bug exposing sensitive data on a financial platform, reported it and received an appreciation letter from…Aug 11, 2023Aug 11, 2023
How are Passwords saved in a server?In our day-to-day online activities, creating accounts, signing up, and logging into various websites and applications are commonplace…Feb 26, 2020Feb 26, 2020