PinnedMedusainInfoSec Write-upsExploiting XSS with Javascript/JPEG PolyglotWhat is a polyglot?Apr 8, 20226Apr 8, 20226
MedusainInfoSec Write-upsBroken Object Level Authorization Vs. Broken Functionality Level Authorization | API Hacking |In this blog, we will explore two significant security vulnerabilities: Broken Object Level Authorization (BOLA) and Broken Functionality…Oct 17, 20231Oct 17, 20231
MedusainInfoSec Write-upsHow to Discover API Subdomains? | API Hacking |In this article, we will delve into the world of API subdomains, exploring their purpose, methods to discover them, and performing API…Sep 27, 20232Sep 27, 20232
MedusainInfoSec Write-upsBypass JWT Authentication | Access Admin PanelServers typically do not store the information contained in JSON web token. They simply verify and decode the token and then authenticate…May 11, 20232May 11, 20232
MedusainInfoSec Write-upsExploiting SQL Injection in Graphql | DVGA |This article covers exploiting SQL Injection manually in a Graphql Application.Mar 2, 2023Mar 2, 2023
MedusainInfoSec Write-upsHow Capabilities actually Work ? | Exploitation | Privilege EscalationDec 20, 20222Dec 20, 20222
MedusaC Programming Puzzles That Will Surprise You!In this blog, we will see some exciting C programs, I want you to look at those programs and try to guess the output without executing. But…Sep 24, 20221Sep 24, 20221
MedusainSystem WeaknessCreating a Malicious PDF File to launch a Phishing AttackPDF is a very popular document format and is trusted among users, so it’s easy to manipulate users to open a pdf and perform some actions.Jul 27, 20221Jul 27, 20221
MedusainSystem WeaknessExploiting Stack Buffer Overflow| Step by Step | Reverse EngineeringIn this blog, we are going to see every step that is required to exploit Stack Buffer Overflow with the help of Immunity Debugger.Jul 10, 2022Jul 10, 2022