help@cyb4rgeek.xyz

+1 (512) 588 6950

vulnerability

Home/Category: vulnerability
MySQL LOAD_FILE() and INTO OUTFILE() Sql Injection
MySQL LOAD_FILE() and INTO OUTFILE() Sql Injection bez0x January 19, 2023

MySQL LOAD_FILE() and INTO OUTFILE() Sql Injection

Photo by Sara Bakhshi on Unsplash In this article, we will discuss the MySQL LOAD_FILE() function and the INTO OUTFILE() function and Sql Injection. MySQL provides the LOAD_FIL

Read More
Full Team Takeover
Full Team Takeover bez0x January 18, 2023

Full Team Takeover

Hare Krishna! My name is Tuhin Bose (tuhin1729). I am currently working as a CTF Designing Consultant at BugBase. In this write-up, I am going to share one of my findings which

Read More
bWAPP: A Vulnerable Web Application for Practicing Vulnerabilities – Installation Guide
bWAPP: A Vulnerable Web Application for Practicing Vulnerabilities – Installation Guide bez0x January 15, 2023

bWAPP: A Vulnerable Web Application for Practicing Vulnerabilities – Installation Guide

How to Install bWAPP in Linux for Testing Vulnerabilities to start your Bug Bounty Hunting bWAPP — bWAPP, a buggy web application, is a free and open-source deliberat

Read More
Clear communication is crucial: why writing effective vulnerability reports matters
Clear communication is crucial: why writing effective vulnerability reports matters bez0x January 13, 2023

Clear communication is crucial: why writing effective vulnerability reports matters

First, let’s address the question of why it is necessary to write a clear report. A clear report is essential for effective communication, ensures that the appropriate steps a

Read More
Exploiting XSS with Javascript/JPEG Polyglot
Exploiting XSS with Javascript/JPEG Polyglot bez0x December 29, 2022

Exploiting XSS with Javascript/JPEG Polyglot

What is a polyglot? Just like PNG, JPEG, and DOC are valid file types, polyglots are a combination of two different file types. For example Phar + JPEG (PHP archive and JPEG fi

Read More
Efficient methodology to get P2 level – subdomain takeover vulnerability
Efficient methodology to get P2 level – subdomain takeover vulnerability bez0x December 27, 2022

Efficient methodology to get P2 level – subdomain takeover vulnerability

Hello Guys, I’m going to explain how I was able to hack a subdomain of an organization with mine easy and efficient methodology. Hello F.R.I.E.N.D !! I was hunting and

Read More