CSRF Testing Out-of-the-Box
A. CSRF via CORS Misconfig + Token Leakage If any api.example.com endpoint has : Access-Control-Allow-Origin: * (or reflects attacker origin) And cookies are still sent (Access-Control-Allow...
A. CSRF via CORS Misconfig + Token Leakage If any api.example.com endpoint has : Access-Control-Allow-Origin: * (or reflects attacker origin) And cookies are still sent (Access-Control-Allow...
1. State-Changing Endpoints Look for actions that change data or account settings, not just fetch data. Feature Example Endpoint Change email /acc...
Fellow Raiders b3ludan , soura While exploring a program’s Container Registry, we found a simple yet impactful flaw: A read-only token could delete a Docker image — something that shouldn’t happen...
🙏 A Big Shoutout to the Mentors and Fellow Raiders Before I dive into the story, I want to take a moment to acknowledge the amazing people who helped shape my journey : Mentors : Shreyansh , XXSRA...
The enumeration phase involved scanning for open ports and directories using tools like nmap and gobuster, revealing SSH and HTTP services. Further exploration uncovered a cipher that, when decrypt...
The penetration test began with a nmap scan, which revealed that ports 22 (SSH) and 65530 were open. Further enumeration using Gobuster on port 65530 led to the discovery of the nt4share directory....
In the enumeration phase, an FTP server with anonymous login was discovered. Upon further investigation, a key was found and successfully decrypted, revealing subdirectories and a logo. Decrypting ...
This process highlights the importance of enumeration and scanning for vulnerabilities to gain initial access to a target system. Through this machine, one can learn the importance of thorough reco...
The penetration test commenced with a scan using nmap, which identified open and filtered ports. An anonymous FTP login revealed a .txt file with port knocking instructions. Knocking on ports 1000,...