Home ยป Archives for 2023
Port forwarding allows remote computers (for example, computers on the Internet) to connect to a specific computer or service within a private local-area network (LAN). SSH (Secure Shell) is a network protocol used to securely connect to a remote computer. It is commonly used to remotely access and manage servers,…
. Introduction NetGear is a well-known name in the networking industry, providing a range of WiFi routers for homes and small businesses. One of the famous models from NetGear is the WNR614 WiFi Home Router. In this article, we’ll look at a vulnerability discovered in the WNR614 router, which allows…
Hello Friends, In this post. I am going to cover Deserialization or Unserialization Vulnerability detailed with a Practical Example. Before going in depth of this post. be clear Desirialize and Unserialize is a same this in two different computer programming language. that is Unserialize in PHP and Deserialize in JAVA.…
Hello Guys! Today I’m gonna explain you some Local File Inclusion Tricks. If you are really interested in Web Application Pentesting and want to learn in-depth about LFI soo, you are in the right place. Blah BLah ๐ .. let’s continue our post. ๐ Index What is File Inclusion Attack?…
Hello All Finally, I managed my time to write something about SSRF (Server Side Request Forgery) Vulnerability which is going wild nowadays in Bug Bounty Programs. Server Side Request Forgery (SSRF) is a type of web application vulnerability that allows an attacker to manipulate the server into making unintended requests…