I was quite surprised to come across this funny CVE, as it was the most bizarre one I had seen so far. This particular CVE was related to Raspberry Pi and the author used defaul
Read MoreStep-by-step guide for uncovering Broken Access Control and Indirect Object Reference vulnerabilities for bug bounty hunters and pentesters.IntroductionAs bug bounty hunters and
Read MoreMicrosoft MSRC Quarterly Leaderboard from my security bug reports submitted.Table of Contents— Part 0 — Whoami?— Part 1 — Selecting a program— Part 2 — Let the hunt
Read MoreIn this Write-Up, I am going to walk you through the bugcrowd’s open challenge to hackers. Note: In case you’re reading this Write-Up without trying out the challenge
Read MoreDomain Name System 0x1 Hey techies, you’ve come to the right place if you’re looking to learn about or refresh your knowledge of DNS. We will be providing a simplified expl
Read MoreHello fellow researchers,Myself, Rafi Ahamed. I am a Cyber Security Researcher from Bangladesh. I love to break security. Anyway, without further ado let’s get to today’s to
Read More