Home ยป Archives for touhid
Introduction SUID (Set User ID) binaries are executables that run with the privileges of the file owner rather than the user who executed the file. This capability can be advantageous in certain scenarios but can also pose significant security risks, particularly when weak file permissions or improper configurations are present.…
Port forwarding allows remote computers (for example, computers on the Internet) to connect to a specific computer or service within a private local-area network (LAN). SSH (Secure Shell) is a network protocol used to securely connect to a remote computer. It is commonly used to remotely access and manage servers,…
. Introduction NetGear is a well-known name in the networking industry, providing a range of WiFi routers for homes and small businesses. One of the famous models from NetGear is the WNR614 WiFi Home Router. In this article, we’ll look at a vulnerability discovered in the WNR614 router, which allows…
Hello Friends, In this post. I am going to cover Deserialization or Unserialization Vulnerability detailed with a Practical Example. Before going in depth of this post. be clear Desirialize and Unserialize is a same this in two different computer programming language. that is Unserialize in PHP and Deserialize in JAVA.…
Hello Guys! Today I’m gonna explain you some Local File Inclusion Tricks. If you are really interested in Web Application Pentesting and want to learn in-depth about LFI soo, you are in the right place. Blah BLah ๐ .. let’s continue our post. ๐ Index What is File Inclusion Attack?…