Introducing the Man-in-the-Prompt (MitP) attackThe Man-in-the-Prompt (MitP) attack — the sneaky cousin of man-in-the-middle attack, instead of intercepting network traffic, attackers…Aug 8Aug 8
Understanding the STRIDE Threat Model for Generative AISafeguarding AI with a Proven Cybersecurity FrameworkAug 7Aug 7
Published inSecureBitUnderstanding- Cyber Security Teams and RolesWant to get started in Cybersecurity but still confused about where to start? What role suits your interest and skill? What team to join in…Jun 10, 2021A response icon1Jun 10, 2021A response icon1
Published inInfoSec Write-upsUnderstanding & Identifying Insecure Deserialization VulnerabilitiesThis post explains the nitty-gritty of Insecure Deserialization Vulnerabilities. We will be covering basic understanding and…Apr 3, 2021Apr 3, 2021
Published inInfoSec Write-upsGetting started with XSS: Cross-Site Scripting AttacksLet’s get started with XSS, in order to get those critical bugs- CSRF, SSRF, RCE. Most of the time, an XSS flaw is the cause of a…Feb 13, 2021Feb 13, 2021
Published inInfoSec Write-upsExploiting Error Based SQL Injections & Bypassing RestrictionsIn this article, we will be learning how to escalate attacks when we are stuck with Error Based SQL Injections. Before diving in, let’s…Jan 17, 2021A response icon1Jan 17, 2021A response icon1
Published inInfoSec Write-upsIdentifying & Exploiting SQL Injection: Manual & AutomatedIn this article, we will start by Identifying the SQL Injection vulnerabilities & how to exploit the vulnerable application. Further, we…Dec 13, 2020Dec 13, 2020
Published inInfoSec Write-upsTesting for Directory or Path Traversal VulnerabilitiesIn this article, we’ll be discussing, how to perform Directory Traversal or Path Traversal attacks, aka “dot-dot-slash”, “directory…Nov 28, 2020A response icon1Nov 28, 2020A response icon1
Published inInfoSec Write-upsUnderstanding & Exploiting: Cross-Site Request Forgery — CSRF vulnerabilitiesCross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unintended actions on a web application in which they…Nov 7, 2020A response icon2Nov 7, 2020A response icon2