infosecwriteups.com Open in urlscan Pro
162.159.152.4  Public Scan

Submitted URL: http://infosecwriteups.com/
Effective URL: https://infosecwriteups.com/?gi=7fa1e29375b0
Submission: On October 17 via manual from SA — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

To make Medium work, we log user data. By using Medium, you agree to our Privacy
Policy, including cookie policy.

Homepage
Open in app
Sign inGet started



A COLLECTION OF AWESOME WRITE-UPS FROM THE BEST HACKERS IN THE WORLDS FROM
TOPICS RANGING FROM BUG BOUNTIES, CTFS, HACK THE BOX WALKTHROUGHS, HARDWARE
CHALLENGES, REAL-LIFE ENCOUNTERS AND EVERYTHING WHICH CAN HELP OTHER ENTHUSIASTS
LEARN. MAINTAINED BY HACKREW. #SHARINGISCARING


ArchiveABOUT USBug BountyCTFDiscord ServerWrite-up SubmissionsWeekly Newsletter
FollowFollowing
👩‍💻$6000 from Microsoft, WAF Bypass, Manual Exploitation, Nuclei Guide, Admin
Panel and much…
👩‍💻$6000 FROM MICROSOFT, WAF BYPASS, MANUAL EXPLOITATION, NUCLEI GUIDE, ADMIN
PANEL AND MUCH…

This CRLF to XSS bug chain resulted in a $6000 bounty from Microsoft.
InfoSec Write-ups
Oct 17
Cool Recon techniques every hacker misses! 🔥🔥
COOL RECON TECHNIQUES EVERY HACKER MISSES! 🔥🔥

Welcome to this article! This article is about some cool recon techniques every
hacker misses! Tighten your belts as we walk you through…
302 Found
Aug 22
Mass Hunting CVE’s Part-1👀🔥
MASS HUNTING CVE’S PART-1👀🔥

CVE, short for Common Vulnerabilities and Exposures, is a list of publicly
disclosed computer security flaws. A CVE number uniquely…
302 Found
Aug 31
HOW TO PREVENT MORE THAN 200 MILLION USERS FROM USING GOOGLE SERVICES

Hi Folks,
Omar Hashem
May 16, 2021
Understanding the NMAP methodology — Part 1
UNDERSTANDING THE NMAP METHODOLOGY — PART 1

Understanding the NMAP methodology from beginner to advance.
Jay Vadhaiya
Sep 10
Analyze your gau result with Gau-Expose Tool
ANALYZE YOUR GAU RESULT WITH GAU-EXPOSE TOOL

Assalamu Alaikum peace be upon you
Tamim Hasan
Mar 28
Why broken access control is the most severe vulnerability
WHY BROKEN ACCESS CONTROL IS THE MOST SEVERE VULNERABILITY

Introduction
Security Lit Limited
Sep 5
👩‍💻Thick Client Pentest, Out-of-band XXE, Bug Hunting Resources, RDP,
LogonTypes, PowerShell…
👩‍💻THICK CLIENT PENTEST, OUT-OF-BAND XXE, BUG HUNTING RESOURCES, RDP,
LOGONTYPES, POWERSHELL…

10 tricks and fun facts about Active Directory shared by @simondotsh.
InfoSec Write-ups
Sep 12
InfoSec Write-ups
A collection of write-ups from the best hackers in the world on topics ranging
from bug bounties and CTFs to vulnhub machines, hardware challenges and real
life encounters. In a nutshell, we are the largest InfoSec publication on
Medium.
More information
Followers
26K
Elsewhere

Latest
Conducting a free AWS Security Assessment with Prowler
CONDUCTING A FREE AWS SECURITY ASSESSMENT WITH PROWLER

Get a complete AWS security report with this free tool
Taimur Ijlal
Oct 17
How I Got $10,000 From GitHub For Bypassing Filtration oF HTML tags
HOW I GOT $10,000 FROM GITHUB FOR BYPASSING FILTRATION OF HTML TAGS

Hey everyone👋, I hope you’re having an A+ week🚀! In today’s blog, I am going
to tell you that, “How I Got $10,000 From GitHuB”.
Saajan Bhujel
Oct 16
HTTP request smuggling Explained and Exploited Part 0x1
HTTP REQUEST SMUGGLING EXPLAINED AND EXPLOITED PART 0X1

Hi! My name is Hashar Mujahid and today we will sneak a peek into Request
Smuggling Vulnerabilities.
Hashar Mujahid
Oct 16
CVE-2022–41040: ProxyNotShell Exchange Vulnerability
CVE-2022–41040: PROXYNOTSHELL EXCHANGE VULNERABILITY

Written by: Harsh Kanojia
Secpy Community
Oct 15
SSH: Introduction, How to Secure and Working
SSH: INTRODUCTION, HOW TO SECURE AND WORKING

Introduction, How to Secure and working of a secure shell
Secpy Community
Oct 15
Write-up: Infinite money logic flaw @ PortSwigger Academy
WRITE-UP: INFINITE MONEY LOGIC FLAW @ PORTSWIGGER ACADEMY

This write-up for the lab Infinite money logic flaw is part of my walkthrough
series for PortSwigger’s Web Security Academy.
Frank Leitner
Oct 15
It’s the Little Things : Breaking an AI
IT’S THE LITTLE THINGS : BREAKING AN AI

A tale of tiny observations that led to a critical finding.
Debangshu Kundu
Oct 13
TryHackMe writeup: Tools R Us
TRYHACKME WRITEUP: TOOLS R US

ToolsRUs (“tryhackme”, 2019) is a fun little TryHackMe room that has its users
“[p]ractise using tools such as dirbuster, hydra, nmap…
Aleksey
Oct 13
$6000 with Microsoft Hall of Fame | Microsoft Firewall Bypass | CRLF to XSS |
Microsoft Bug Bounty
$6000 WITH MICROSOFT HALL OF FAME | MICROSOFT FIREWALL BYPASS | CRLF TO XSS |
MICROSOFT BUG BOUNTY

Microsoft Firewall Bypass
Neh Patel
Oct 12
Critical IDOR Vulnerability on Medium?
CRITICAL IDOR VULNERABILITY ON MEDIUM?

Hello Guys,
zer0d
Oct 12
Why do Deserialization Vulnerabilities occur?
WHY DO DESERIALIZATION VULNERABILITIES OCCUR?

Introduction
Security Lit Limited
Oct 10
Harley Malware: New Attack on Android Devices
HARLEY MALWARE: NEW ATTACK ON ANDROID DEVICES

There has been a recent surge in Harley malware targeting Android users, which
was first found on Samsung, Huawei, and Google phones
Secpy Community
Oct 10
👩‍💻Roadmap to Cybersecurity in 2022, Full-Read SSRF, IDOR in GraphQL, GCP
Pentesting, and much…
👩‍💻ROADMAP TO CYBERSECURITY IN 2022, FULL-READ SSRF, IDOR IN GRAPHQL, GCP
PENTESTING, AND MUCH…

Watch this talk about $25 billion+ of value, locked in the practical attacks
against bridges.
InfoSec Write-ups
Oct 10
Threat Hunting Series: Using Threat Emulation for Threat Hunting
THREAT HUNTING SERIES: USING THREAT EMULATION FOR THREAT HUNTING

This post will demonstrate how threat emulation can be used for threat hunting.
I often use threat emulation to understand the evidence an…
Kostas
Oct 9
Accidental Account takeover
ACCIDENTAL ACCOUNT TAKEOVER

Hello Security Community,
Ajay Magar
Oct 9
Everything About Path Traversal Vulnerability
EVERYTHING ABOUT PATH TRAVERSAL VULNERABILITY

Introduction
Security Lit Limited
Oct 9
EXPLOITING OS COMMAND INJECTION VULNERABILITIES
EXPLOITING OS COMMAND INJECTION VULNERABILITIES

Hi! My name is Hashar Mujahid. And today we are going to learn what OS command
injections are and how we can exploit them.
Hashar Mujahid
Oct 9
Best CTF Platforms
BEST CTF PLATFORMS

I have compiled a list of Red Team/Blue Team Capture The Flag Platforms to test
your skills on.
Stefan P. Bargan
Oct 8
CVE-2022–40684: New Authentication Bypass Affecting FortiGate and FortiProxy
CVE-2022–40684: NEW AUTHENTICATION BYPASS AFFECTING FORTIGATE AND FORTIPROXY

Fortinet has patched a critical authentication bypass in its FortiOS and
FortiProxy products that could lead to administrator access.
Secpy Community
Oct 8
Browser in the Browser Attack
BROWSER IN THE BROWSER ATTACK

A Browser-in-the-Browser(BiTB) attack simulates a login window with a spoofed
domain within a parent browser window to steal credentials.
Secpy Community
Oct 7
njRAT Malware Analysis
NJRAT MALWARE ANALYSIS

Introduction
Aaron Stratton
Oct 7
The Importance of Infrastructure as Code Security Scanning
THE IMPORTANCE OF INFRASTRUCTURE AS CODE SECURITY SCANNING

The problem with using Infrastructure as Code without security testing
Don Santos
Oct 7
Full Company Building Takeover
FULL COMPANY BUILDING TAKEOVER

Hello everybody, Most of the time you read about account takeover or
Infrastructure takeover but did you heard before about Company…
Omar Hashem
Oct 6
WordPress Security
WORDPRESS SECURITY

Initially started as a blogging platform has turned into a lifesaver for many
startups, companies, influencers, and bloggers. WordPress…
Security Lit Limited
Oct 6
Try Hack Me: Pickle Rick Walkthrough
TRY HACK ME: PICKLE RICK WALKTHROUGH

A Rick and Morty CTF. Help turn Rick back into a human!
JoĂŁo Marcelo
Oct 6
About InfoSec Write-upsLatest StoriesArchiveAbout MediumTermsPrivacy