Uncovering Local File Inclusion Vulnerabilities: A Practical Approach to Path Traversal HuntingLocal File Inclusion (LFI) is one of the most common yet impactful vulnerabilities in modern web applications. It arises when user-supplied…Sep 21Sep 21
How I Took Over Millions of Instagram Accounts Using SQL Injection Method & Takeover via Filtering…Bagaimana Saya Mengambil Alih Jutaan Akun Instagram Menggunakan Metode Injeksi SQL & Pengambilalihan melalui Fungsi Memfilter Pengguna…Dec 30, 2024A response icon1Dec 30, 2024A response icon1
Unauthenticated RCE Bug Bounty POC | Private Bug Bounty Program | CVE-2020–11798Abstrak PendahuluanDec 26, 2024Dec 26, 2024
Bug Bounty Methodology for SQL Injection with Waybash URLsThis article discusses a methodological approach in a bug bounty program, focusing on SQL Injection exploitation by leveraging URL archives…Oct 22, 2024A response icon1Oct 22, 2024A response icon1
Arbitrary Code Execution Toyota — Oracle Forms and ReportsCVE-2012–3153 pada Toyota Company ProjectOct 9, 2024Oct 9, 2024
SSRF to RCE with Jolokia and MBeansOke, ini satu hal lucu yang baru-baru ini saya manfaatkan.Oct 6, 2024Oct 6, 2024
Kernels: Understanding the Heart of Operating Systems & Understanding Kernel ExploitationLatar BelakangMar 19, 2024Mar 19, 2024
GeoServer SQL Injection (CVE-2023–25157 & CVE-2023–25158)IntroductionJan 12, 2024A response icon1Jan 12, 2024A response icon1
Apache HTTP Server Path Traversal & Remote Code Execution (RCE) Kepolisian Negara Republik…Exploitation Impact : Tingkat keparahan kerentanan ini meningkat jika skrip CGI diaktifkan untuk jalur yang disamarkan. Mengeksploitasi…Jan 7, 2024Jan 7, 2024
Kerentanan CVE-2022–27926 XSS pada Zimbra Collaboration Suite (ZCS)Kerentanan Zimbra Collaboration Suite (XSS) yang telah diidentifikasi sebagai CVE-2022–27926. Exploitation of Disclosed Zimbra…Jan 7, 2024Jan 7, 2024