The page you are trying to reach does not exist, or has been moved. Please use the menus or the search box to find what you are looking for.
Search
Recent Posts
- From Accessing Restricted Functionality via URL Found in .js File, to Vertical Privilege Escalation through Modification of the ‘accessLevel’ Value in HTTP Responses on the API – Company Blog
- The Unexpected “0” Master ID for Account Data Manipulation
- From Recon via Censys and DNSdumpster, to Getting P1 by Login Using Weak Password – “password”
- Optimizing Hunting Results in VDP for use in Bug Bounty Programs - From Sensitive Information Disclosure to Accessing Hidden APIs which can be used to Retrieve Customer Data
- From Recon to Bypassing MFA Implementation in OWA by Using EWS Misconfiguration
- From 3,99 to 1,650 USD (Part I) – Simple Vertical Privilege Escalation by Changing HTTP Response
- From Recon to Optimizing RCE Results – Simple Story with One of the Biggest ICT Company in the World
Categories
- About Me (3)
- Achievements (2)
- Bug Report (30)
- Desktop Apps (4)
- Mobile Apps (5)
- Random Things (8)
- Terms of Use (1)
- Web Apps (21)
- Write-Up (19)
- Write-Up in Bahasa (4)