Open in app

Sign In

Write

Sign In

Medusa
Medusa

435 Followers

Home

About

Published in InfoSec Write-ups

·Pinned

Exploiting XSS with Javascript/JPEG Polyglot

What is a polyglot? Just like PNG, JPEG, and DOC are valid file types, polyglots are a combination of two different file types. For example Phar + JPEG (PHP archive and JPEG file), GIFAR (Gif and Rar file) Javascript + JPEG, etc. Applications allow only certain file types on features like file upload and…

Xss Attack

4 min read

Exploiting XSS with Javascript/JPEG Polyglot
Exploiting XSS with Javascript/JPEG Polyglot
Xss Attack

4 min read


Published in InfoSec Write-ups

·Mar 2

Exploiting SQL Injection in Graphql | DVGA |

This article covers exploiting SQL Injection manually in a Graphql Application. Graphql Introduction Graphql is a query language for APIs used to interact with the back end. It works as an intermediate between the client and the backend. It is like the REST API but unlike the REST API that uses a…

GraphQL

5 min read

Exploiting SQL Injection in Graphql | DVGA |
Exploiting SQL Injection in Graphql | DVGA |
GraphQL

5 min read


Published in InfoSec Write-ups

·Dec 20, 2022

How Capabilities actually Work ? | Exploitation | Privilege Escalation

SUID : The Traditional Linux Way Sometimes a user with low privileges needs to perform specific tasks with higher privileges and for that Linux has functionality for setting SUID bit on particular binaries. The SUID (Set User ID) bit is a special permission that can be set on executable files in the Linux operating system. …

Linux

5 min read

How Capabilities actually Work ? | Exploitation | Privilege Escalation
How Capabilities actually Work ? | Exploitation | Privilege Escalation
Linux

5 min read


Sep 24, 2022

C Programming Puzzles That Will Surprise You!

In this blog, we will see some exciting C programs, I want you to look at those programs and try to guess the output without executing. But of course, you can execute the programs after you have solved them yourself. Don’t worry it’s not going to be a complex program…

Programming

6 min read

C Programming Puzzles That Will Surprise You!
C Programming Puzzles That Will Surprise You!
Programming

6 min read


Published in System Weakness

·Jul 27, 2022

Creating a Malicious PDF File to launch a Phishing Attack

PDF is a very popular document format and is trusted among users, so it’s easy to manipulate users to open a pdf and perform some actions. Phishing is a type of social engineering attack that misguide user to perform some action that leads to stealing user data, including login credentials…

5 min read

Creating a Malicious PDF File to launch a Phishing Attack
Creating a Malicious PDF File to launch a Phishing Attack

5 min read


Published in System Weakness

·Jul 10, 2022

Exploiting Stack Buffer Overflow| Step by Step | Reverse Engineering

In this blog, we are going to see every step that is required to exploit Stack Buffer Overflow with the help of Immunity Debugger. I’m not going to talk about what stack is and what stack overflow is as this blog only covers the exploitation part, but if you want…

Reverse Engineering

8 min read

Exploiting Stack Buffer Overflow| Step by Step | Reverse Engineering
Exploiting Stack Buffer Overflow| Step by Step | Reverse Engineering
Reverse Engineering

8 min read


Published in System Weakness

·Jun 5, 2022

Log Poisoning to Remote Code Execution | LFI | cUrl |

In this article, we will see how to perform Remote Code Execution through Log Poisoning which is a type of Local File Inclusion. Let’s say there’s a web application using PHP as its backend language. For this whole process, burp can be used but I’m going to use cUrl to…

Hacking

4 min read

Log Poisoning to Remote Code Execution | LFI | cUrl|
Log Poisoning to Remote Code Execution | LFI | cUrl|
Hacking

4 min read


Published in System Weakness

·Apr 27, 2022

Passive Reconnaissance Using Only Kali Terminal | Infosec |

Disclaimer: This blog is only for educational purpose. What is Reconnaissance? Recon or Reconnaissance means gathering information about the target network, machine, domain, server, or a particular service to better understand the target and find potential points of exploitation. There are two types of recon:- Active Recon A pentester uses it to gather…

Reconnaissance

4 min read

Passive Reconnaissance Using Only Kali Terminal | Infosec |
Passive Reconnaissance Using Only Kali Terminal | Infosec |
Reconnaissance

4 min read


Published in System Weakness

·Mar 3, 2022

Exploiting Stack Buffer Overflow to get a Privileged Shell

A program would usually comprise multiple functions and there needs to be a way of tracking which function has been called, and which data is passed from one function to another. The stack is a region of contiguous memory addresses and it is used to make it easy to transfer…

6 min read

Exploiting Stack Buffer Overflow to get a Privileged Shell
Exploiting Stack Buffer Overflow to get a Privileged Shell

6 min read


Published in System Weakness

·Feb 25, 2022

Golden/Silver Ticket Attack | Kerberos | Active Directory |

In this blog, we are going to talk about golden and silver ticket attacks. KDC Overview The Key Distribution Center is a service in Active Directory that issues TGT tickets to clients so they can access services with proper authentication and authorization. Just like every service in AD is associated with an…

Windows

3 min read

Golden/Silver Ticket Attack | Kerberos | Active Directory |
Golden/Silver Ticket Attack | Kerberos | Active Directory |
Windows

3 min read

Medusa

Medusa

435 Followers

Hacking Articles Straight to the Point!

Following
  • Vickie Li

    Vickie Li

  • Thexssrat

    Thexssrat

  • Haris Muthusamy

    Haris Muthusamy

  • Ravaan

    Ravaan

  • Mohsin khan

    Mohsin khan

See all (29)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech