Hello Cyberman! How are you? I hope you fine. This article subject email injection. I a lot of see it in bug bounty program. And I said “What I don’t write blog post this subject?”. And you know be a long time don’t wrote blog post. I finished it this mission. And I ready again […]
Hello cyberman!This article subject LDAP and hacking with LDAP. First of all, we need to know what LDAP is. The definition LDAP in Wikipeadia: The LDAP (The Lightweight Directory Access Protocol) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services […]
Hello Cyberman! This article subject licence software with Javascript safety.There a program. And its name Mobirise. Really, wonderful program. This program website template create. And perfect designs create. As a earlier, this program when you create web site design it add licence. And this licence there is web page footer area. It is not seen. […]
Hello Cyberman!How are u? I hope you fine.This article subject ssrf another back-end system attack method.What is SSRF if you don’t know, read this post. For click read article. Now, We are this attack method maintain with different example. This method name: Another back-end system. If you say how does this work, I telling. Above […]
Hello Cyberman! This article subject SSRF attacks. This series of articles will be with Portswigger solutions. Firstly What Is SSRF? The SSRF (Server Side Request Forgery) is every time could be seen. SSRF allows an attacker to modify a parameter in the web application so that it can generate requests from or control requests from […]
Hello Cyberman! This article subject Javascript and its blockeds. Firstly, we need know what is Javascript. What Is The JavaScript? Javascript is a programming language. This technology working in web browsers based. But today, it appeals to many different areas. For example: Desktop App Mobile App Game WEB App or design However, our topic will […]
Hello Cyberman, This article subject XML/XPath Injection vulnerability on web app. What Is The XPath Vulnerability? First, we need learning to XML. It is possible to summarize with a quote from Wikipedia below. XML; Extensible Markup Language (XML) is a markup language and file format for storing, transmitting, and reconstructing arbitrary data. Yes, as […]
Hello Cyberman! This article subject os command injection on web app. With this vulnerability, the attacker can run any operating system command in areas allowed by the system. The operating system does not matter. For example: If there is this vulnerability, when the attacker enters a command (like whoami) on the system, he/she will see […]
Hello cyberman! The content of this article will be on Server-Side Includes or SSI Injection. What Is The SSI Injection? On the server side, the named vulnerability program is the controls that proceed through feeding the web pages to be created with html with dynamic content. What Kind Of Damage Is This Vulnerability? It […]
Hello Cyberman, The content of this article will be on changing password with csrf. It’s a pretty dangerous vulnerability. It is very common nowadays. First of all, they will be used for this type of vulnerability: Burp Suite To demonstrate this web vulnerability, I will show it on the vulnerable website called DVWA. If you […]