PHP Insecure Deserialization vulnerabilities

In this blog, we will discuss PHP insecure deserialization vulnerabilities and their prevention. The deserialization vulnerability in PHP is also known as PHP Object Injection.…
Read More

Node JS deserialization exploitation

In this blog, we briefly explore Node JS deserialization Exploitation. The process typically involves crafting a malicious payload that, when deserialized by the application, triggers…
Read More

Insecure Deserialization foundations

In the world of web applications, data exchange is paramount. Often, complex objects containing user information or application state need to be transmitted and stored…
Read More

Insecure deserialization exploitation in Java

In our Blog, we have discussed the foundations of insecure deserialization. Now in this Blog, we’ll take a glance at multiple insecure deserialization exploitation in…
Read More

Install and configure Nginx Proxy Manager Like a Pro

NGINX Proxy Manager The Nginx Proxy Manager offers a convenient tool for managing proxy hosting. The proxymanager makes it relatively easy to forward traffic to…
Read More

iOS Pentesting Lab Setup with Palera1n

Dear Awesome Hackers, Let’s deep dive into the iOS pentesting lab setup with Palera1n Let’s deep dive into the iOS pentesting lab setup with Palera1n…
Read More

A Guide to Directory Traversal Vulnerability in 2024

A path traversal attack, also called directory traversal, is an attempt to access files and directories that are stored outside the designated web root folder.…
Read More

The Only Information Disclosure Guide You’ll Ever Need!!

Information Disclosure? Let’s Talk About It!! Information disclosure, generally occurs when a website unintentionally reveals sensitive information to its users. This could include everything from…
Read More

The A – Z Of SQL Injection P3NTESTING

This Blog will provide an overview of SQL injection (SQLi), including its definition and common examples. It will also cover techniques for identifying and exploiting…
Read More

SPRING BOOT PENTESTING PART 5- SECURING SPRING WEB APPS AND API

All the previous blogs were specific for Fundamentals , lab setup and exploits . But in this blog, we will look at the SECURING SPRING…
Read More