PinnedMedusainInfoSec Write-upsExploiting XSS with Javascript/JPEG PolyglotWhat is a polyglot?4 min read·Apr 8, 2022--6--6
MedusainInfoSec Write-upsBroken Object Level Authorization Vs. Broken Functionality Level Authorization | API Hacking |In this blog, we will explore two significant security vulnerabilities: Broken Object Level Authorization (BOLA) and Broken Functionality…10 min read·Oct 17, 2023--1--1
MedusainInfoSec Write-upsHow to Discover API Subdomains? | API Hacking |In this article, we will delve into the world of API subdomains, exploring their purpose, methods to discover them, and performing API…7 min read·Sep 27, 2023--2--2
MedusainInfoSec Write-upsBypass JWT Authentication | Access Admin PanelServers typically do not store the information contained in JSON web token. They simply verify and decode the token and then authenticate…5 min read·May 11, 2023--2--2
MedusainInfoSec Write-upsExploiting SQL Injection in Graphql | DVGA |This article covers exploiting SQL Injection manually in a Graphql Application.5 min read·Mar 2, 2023----
MedusainInfoSec Write-upsHow Capabilities actually Work ? | Exploitation | Privilege Escalation5 min read·Dec 20, 2022--2--2
MedusaC Programming Puzzles That Will Surprise You!In this blog, we will see some exciting C programs, I want you to look at those programs and try to guess the output without executing. But…6 min read·Sep 24, 2022--1--1
MedusainSystem WeaknessCreating a Malicious PDF File to launch a Phishing AttackPDF is a very popular document format and is trusted among users, so it’s easy to manipulate users to open a pdf and perform some actions.5 min read·Jul 27, 2022--1--1
MedusainSystem WeaknessExploiting Stack Buffer Overflow| Step by Step | Reverse EngineeringIn this blog, we are going to see every step that is required to exploit Stack Buffer Overflow with the help of Immunity Debugger.8 min read·Jul 10, 2022----