top of page

IDOR Vulnerability

IDOR - Background Info ; Website.com/view_user_info?user_id=1 In its simplest and most common form, an IDOR vulnerability arises when the...

Recon Methodology !

This tool can be used in addition to your usual approach for Penetration testing . The idea is to quickly check and gather information...

Firewall 🔥

What Is Firewall A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data...

Methods to bypass 2FA .

What is 2 FA ? 2FA stands for 2-factor authentication. It is used as an additional layer of security for user accounts. This simply means...

SQL Injection

Login function module: User Authentication . Input: User id and Password SQL: select * from admin where user_id = 'admin' and...

DNS leak

Let us assume that you are using an anonymity or privacy service... It is extremely important for you that all the traffic that is...

Scope based recon

Reconnaissance (aka Recon) is an essential process in pentesting, especially Black Box Pentesting, where you don't have specifics about...

Blog: Blog2

Do it

Butwal, Nepal

Subscribe Form

Thanks for submitting!

  • Instagram
  • Twitter
  • Blogger
  • LinkedIn

Created by @Maniesh Neupane 

bottom of page