goswamiijayainSecureBitUnderstanding- Cyber Security Teams and RolesWant to get started in Cybersecurity but still confused about where to start? What role suits your interest and skill? What team to join in…6 min read·Jun 10, 2021--1--1
goswamiijayainInfoSec Write-upsUnderstanding & Identifying Insecure Deserialization VulnerabilitiesThis post explains the nitty-gritty of Insecure Deserialization Vulnerabilities. We will be covering basic understanding and…5 min read·Apr 3, 2021----
goswamiijayainInfoSec Write-upsGetting started with XSS: Cross-Site Scripting AttacksLet’s get started with XSS, in order to get those critical bugs- CSRF, SSRF, RCE. Most of the time, an XSS flaw is the cause of a…9 min read·Feb 13, 2021----
goswamiijayainInfoSec Write-upsExploiting Error Based SQL Injections & Bypassing RestrictionsIn this article, we will be learning how to escalate attacks when we are stuck with Error Based SQL Injections. Before diving in, let’s…7 min read·Jan 17, 2021--1--1
goswamiijayainInfoSec Write-upsIdentifying & Exploiting SQL Injection: Manual & AutomatedIn this article, we will start by Identifying the SQL Injection vulnerabilities & how to exploit the vulnerable application. Further, we…7 min read·Dec 13, 2020----
goswamiijayainInfoSec Write-upsTesting for Directory or Path Traversal VulnerabilitiesIn this article, we’ll be discussing, how to perform Directory Traversal or Path Traversal attacks, aka “dot-dot-slash”, “directory…10 min read·Nov 28, 2020--1--1
goswamiijayainInfoSec Write-upsUnderstanding & Exploiting: Cross-Site Request Forgery — CSRF vulnerabilitiesCross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unintended actions on a web application in which they…5 min read·Nov 7, 2020--2--2
goswamiijayainInfoSec Write-upsIdentifying & Escalating HTTP Host Header Injection attacksThe purpose of the HTTP Host header is to help identify which back-end component the client wants to communicate with. Several…6 min read·Oct 30, 2020--3--3
goswamiijayainInfoSec Write-upsBreaking down — Command InjectionsCommand Injection or OS Command Injection is Remote Code execution vulnerabilities, where an attacker is able to exploit an unsanitized…6 min read·Oct 18, 2020--1--1
goswamiijayainInfoSec Write-upsServer-Side Request Forgery — SSRF: Exploitation TechniqueServer-side request forgery, or SSRF, is a vulnerability that allows an attacker to use a vulnerable server to make HTTP requests on the…4 min read·Oct 10, 2020----