infosecwriteups.com Open in urlscan Pro
162.159.152.4  Public Scan

Submitted URL: http://infosecwriteups.com/
Effective URL: https://infosecwriteups.com/?gi=bf5345407885
Submission: On March 22 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

To make Medium work, we log user data. By using Medium, you agree to our Privacy
Policy, including cookie policy.

Homepage
Open in app
Sign inGet started



AWESOME WRITE-UPS FROM THE WORLD’S BEST HACKERS INTOPICS RANGING FROM BUG
BOUNTIES, CTFS, HACK THE BOX WALKTHROUGHS, HARDWARE CHALLENGES, AND REAL-LIFE
ENCOUNTERS. SUBSCRIBE TO OUR WEEKLY NEWSLETTER FOR THE COOLEST INFOSEC UPDATES:
HTTPS://WEEKLY.INFOSECWRITEUPS.COM/


ArchiveBug BountyWrite-up SubmissionsHouse Of Hackers Forum
FollowFollowing
How to Hack Web Browsers with BeEF Framework
HOW TO HACK WEB BROWSERS WITH BEEF FRAMEWORK

The word BeEF stands for Browser Exploitation Framework. The tool was designed
to explore the vulnerabilities in browsers and test them.
Frost
Mar 21
Join Our Elite Hacker Community
House of Hackers
Cool Recon techniques every hacker misses! 🔥🔥
COOL RECON TECHNIQUES EVERY HACKER MISSES! 🔥🔥

Welcome to this article! This article is about some cool recon techniques every
hacker misses! Tighten your belts as we walk you through…
302 Found
Aug 22, 2022
How I Was Able to Takeover User Accounts via CSRF on an E-Commerce Website
HOW I WAS ABLE TO TAKEOVER USER ACCOUNTS VIA CSRF ON AN E-COMMERCE WEBSITE

We’ll discuss the topic of cross-site request forgery (CSRF) vulnerabilities and
how it can lead to a one-click account take
Crisdeo Nuel Siahaan
Feb 5
How I hacked into a Telecom Network — Part 1 (Getting the RCE)
HOW I HACKED INTO A TELECOM NETWORK — PART 1 (GETTING THE RCE)

TLDR; Red Team Engagement for a telecom company. Got a foothold on the company’s
Network Monitoring System (NMS). Sorted reverse shell…
Harpreet Singh
Jul 11, 2020
Full Company Building Takeover
FULL COMPANY BUILDING TAKEOVER

Hello everybody, Most of the time you read about account takeover or
Infrastructure takeover but did you heard before about Company…
Omar Hashem
Oct 6, 2022
InfoSec Write-ups
A collection of write-ups from the best hackers in the world on topics ranging
from bug bounties and CTFs to vulnhub machines, hardware challenges and real
life encounters. Subscribe to our weekly newsletter for the coolest infosec
updates: https://weekly.infosecwriteups.com/
More information
Followers
27K
Elsewhere

Subscribe to our Weekly Infosec Newsletter
Infosec Weekly
Latest
Reflected XSS on Admin Login Page
REFLECTED XSS ON ADMIN LOGIN PAGE

Hi! I’m Aswin,security researcher and a penetration tester.Here we are
discussing reflected XSS in a private bug bounty program.
ASWIN K V
Mar 20
MITRE | Tryhackme Room Writeup/Walkthrough | By Md Amiruddin
MITRE | TRYHACKME ROOM WRITEUP/WALKTHROUGH | BY MD AMIRUDDIN

This room will discuss the various resources MITRE has made available for the
cybersecurity community.
Md Amiruddin
Mar 20
Understanding CVE-2023–23397: The Microsoft Outlook Vulnerability You Need to
Know About
UNDERSTANDING CVE-2023–23397: THE MICROSOFT OUTLOOK VULNERABILITY YOU NEED TO
KNOW ABOUT

Introduction:
Security Lit Limited
Mar 20
JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)
JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0X02)

Hi! My name is Hashar Mujahid. I am a security researcher and a penetration
tester. This blog is part 2 of the comprehensive exploitation…
Hashar Mujahid
Mar 19
SecGPT transforms cybersecurity through AI-driven insights.
SECGPT TRANSFORMS CYBERSECURITY THROUGH AI-DRIVEN INSIGHTS.

Hello folks,
ASWIN K V
Mar 18
A Game-Changing Tool for Bug Bounty Hunters and Security Researchers
A GAME-CHANGING TOOL FOR BUG BOUNTY HUNTERS AND SECURITY RESEARCHERS

In the ever-evolving landscape of cybersecurity, staying ahead of threats
requires utilizing advanced tools and techniques. One such tool…
Security Lit Limited
Mar 18
Flutter Hackers: Uncovering the Dev’s Myopia (Part 2)
FLUTTER HACKERS: UNCOVERING THE DEV’S MYOPIA (PART 2)

Deep dive in reverse engineering Flutter APK Release Mode with Frida
Felix Alexander
Mar 18
From Beginner to Pro: Secureum RACEs and the Journey to Ethereum Security
Mastery
FROM BEGINNER TO PRO: SECUREUM RACES AND THE JOURNEY TO ETHEREUM
SECURITY MASTERY

Hello hackers!!! Are you looking for a perfect place to learn web3 security? Do
you know about Secureum? Secureum is a newsletter that…
Yuvarajan
Mar 18
Flutter Hackers: Uncovering the Dev’s Myopia (Part 1)
FLUTTER HACKERS: UNCOVERING THE DEV’S MYOPIA (PART 1)

Life hack for understanding Flutter Application through source code leaks
Felix Alexander
Mar 18
Red Team Engagements | Tryhackme Writeup/Walkthrough | By Md Amiruddin
RED TEAM ENGAGEMENTS | TRYHACKME WRITEUP/WALKTHROUGH | BY MD AMIRUDDIN

Learn the steps and procedures of a red team engagement, including planning,
frameworks, and documentation.
Md Amiruddin
Mar 17
Alibaba Cloud WAF Command Injection Bypass via Wildcard Payload in All 1,462
Built-in Rule Set
ALIBABA CLOUD WAF COMMAND INJECTION BYPASS VIA WILDCARD PAYLOAD IN ALL 1,462
BUILT-IN RULE SET

Alibaba WAF version 3.0 was tested and very common payload was found bypassing
command injection.
Divyanshu
Mar 17
Learning about Encryption, Encoding, and Hashing
LEARNING ABOUT ENCRYPTION, ENCODING, AND HASHING

BASIC INTRODUCTION
Security Lit Limited
Mar 17
Anatomy of a Reflected XSS: My Discovery on a Microsoft’s Subdomain
ANATOMY OF A REFLECTED XSS: MY DISCOVERY ON A MICROSOFT’S SUBDOMAIN

A few days ago, while browsing the website visualstudio.microsoft.com[1], I
performed some tests on that Microsoft’s subdomain to check for…
Sawrav Chowdhury
Mar 17
Red Team Fundamentals | Tryhackme Writeup/Walkthrough | By Md Amiruddin
RED TEAM FUNDAMENTALS | TRYHACKME WRITEUP/WALKTHROUGH | BY MD AMIRUDDIN

Learn about the basics of a red engagement, the main components and stakeholders
involved, and how red teaming differs from other cyber…
Md Amiruddin
Mar 16
How I Got Free Travel on Namma Metro
HOW I GOT FREE TRAVEL ON NAMMA METRO

As someone who uses public transportation regularly, I rely on it to get me
where I need to go quickly and efficiently. That’s why I was…
Lohith Gowda M
Mar 15
Bypassing Character Limit — XSS Using Spanned Payload
BYPASSING CHARACTER LIMIT — XSS USING SPANNED PAYLOAD

Hello, I am Syed Mushfik Hasan Tahsin aka SMHTahsin33, an 18 Y/O Cyber Security
Enthusiast from Bangladesh. I am into Infosec due to…
SMHTahsin33
Mar 15
What is SQL Injection and How Does it Work
WHAT IS SQL INJECTION AND HOW DOES IT WORK

SQL Injection is a web hacking technique of inserting SQL commands in
user-supplied data fields of web applications and submitting them for…
Frost
Mar 15
Web Application Security | Tryhackme Writeup/Walkthrough | By Md Amiruddin
WEB APPLICATION SECURITY | TRYHACKME WRITEUP/WALKTHROUGH | BY MD AMIRUDDIN

Learn about web applications and explore some of their common security issues.
Md Amiruddin
Mar 14
TryHackMe writeup: Attacktive Directory
TRYHACKME WRITEUP: ATTACKTIVE DIRECTORY

In this article, I will hack into an Active Directory system with Impacket and
other tools
Aleksey
Mar 14
TryHackMe Walthrough — Bugged
TRYHACKME WALTHROUGH — BUGGED

In this post I will walk you through the Room Bugged from Try Hack me. This room
(Bugged) is designed to be an IoT hacking exercise, the…
Salvador Beltrán
Mar 14
How I Leak Other’s Access Token by Exploiting Evil Deeplink Flaw
HOW I LEAK OTHER’S ACCESS TOKEN BY EXPLOITING EVIL DEEPLINK FLAW

We’ll discuss the topic of Deeplink x WebView vulnerability I recently found and
how it can lead to an access token stealing.
Crisdeo Nuel Siahaan
Mar 13
How to Master in Real Cyber Threat Intelligence? Build Military-Grade
Intelligence Skills!
HOW TO MASTER IN REAL CYBER THREAT INTELLIGENCE? BUILD MILITARY-GRADE
INTELLIGENCE SKILLS!

Resharing news and deploying IOCs is not real cyber threat intelligence. See how
to develop military-grade cyber threat intelligence…
CyberSec_Sai
Mar 12
Is the CEH exam difficult? Guide to pass it with a perfect score.
IS THE CEH EXAM DIFFICULT? GUIDE TO PASS IT WITH A PERFECT SCORE.

My score and the leader board
Eryk Perzewski
Mar 12
XXE with ChatGPT
XXE WITH CHATGPT

Generate Custom XXE Payloads with AI
Mike Takahashi
Mar 12
IoT Protocols(MQTT ve CoAP)
IOT PROTOCOLS(MQTT VE COAP)

IoT Protocols(MQTT ve CoAP)
Anil Yelken
Mar 12
About InfoSec Write-upsLatest StoriesArchiveAbout MediumTermsPrivacy