Chained OS command injection with privilege escalation to achieve full remote code execution on a production target. Includes payload crafting and post-exploitation notes.
Read writeupA running record of research findings, site updates, new writeups, and tool releases by Naveen Jagadeesan — Security Analyst & Researcher.
Chained OS command injection with privilege escalation to achieve full remote code execution on a production target. Includes payload crafting and post-exploitation notes.
Read writeupAbused flawed hotel booking logic to obtain subscriptions at $0 and trigger unauthorized discounts across booking flows.
Read writeupLeveraged mass assignment flaw to escalate privileges and exfiltrate the entire production database via crafted API payloads.
Read writeupBypassed multiple WAF rules in a financial app to exploit SQLi and exfiltrate the database. Includes bypass techniques and enumeration approach.
Read writeupExploited price parameter tampering to purchase products and services below listed cost, bypassing server-side validation.
Read writeupDemonstrated full account takeover in a financial web app by exploiting weak session storage implementation and token reuse.
Read writeupDiscovered and exploited DLL hijacking in a widely-used business automation product, leading to persistent RCE on Windows targets.
Read writeupDeep-dive reference guide covering insecure deserialization concepts, identification techniques, and exploitation across multiple frameworks.
Read writeupExploited IDOR to access and enumerate other users' linked bank accounts in a fintech application with no authorization checks on object references.
Read writeupIdentified API security misconfiguration leading to exposure of thousands of PII records with no authentication required on sensitive endpoints.
Read writeupExploited time-based blind SQLi to enumerate and exfiltrate the full database. Covers detection, manual exploitation, and automation with sqlmap.
Read writeupUncovered and responsibly disclosed a large-scale subdomain takeover vulnerability using automated enumeration with subzy across a large target's external attack surface.
Read writeupStep-by-step guide to jailbreaking iPhone and configuring a full dynamic analysis environment for iOS application security testing.
Read guideIntercepted and manipulated server responses to bypass authentication logic and take over targeted user accounts.
Read writeupDiscovered reflected cross-site scripting vulnerability in a public program, bypassing client-side filters via payload encoding.
Read writeup