Home » Archives for touhid » Page 2
Hello All Finally, I managed my time to write something about SSRF (Server Side Request Forgery) Vulnerability which is going wild nowadays in Bug Bounty Programs. Server Side Request Forgery (SSRF) is a type of web application vulnerability that allows an attacker to manipulate the server into making unintended requests…
Hello All, PHP type juggling is a feature of the PHP programming language that allows variables to automatically change their data type based on the context in which they are used. This can lead to unexpected results and can potentially create security vulnerabilities if not handled properly. In PHP, there…
After a long time. Finally, I manage my time to write detailed things about one very famous attack. which is “Subdomain Takeover” attack. Nowadays this vulnerability goes wild just because of bug hunters. I just try to write the “Subdomain Takeover” attack detailed with an in-depth explanation for my readers.
Hello Guys, I am going to discuss a way to enumerate users of target system where Finger Protocol enables. but first, it’s better to understand what is finger protocol and how its work. In this post, ill Explain some theory behind Finger Service and protocol after that we’ll cover main…
hello folks, In this post, I am going to explain how to download and install Metasploitable3 in Linux with Virtual box. Index Introduction of Metasploitable3 Setup RequiredTools. Build Metasploitable3 Automatically ( for Pen tester ) Build Metasploitable3 Manually ( For Developers ) Pro Tip. (Optional) Download Metasploit3 ( VirtualBox OVA ) (Noo Need…