Exploiting Unrestricted File Upload to achieve Remote Code Execution on a bug bounty program |
|
|
|
From AWS S3 Misconfiguration to Sensitive Data Exposure |
|
|
|
Chaining password reset link poisoning, IDOR, and information leakage to achieve account takeover at api.redacted.com |
|
|
|
From SQL Injection to Hall Of Fame |
|
|
|
The $1,000 worth cookie |
|
|
|
A tale of my first ever full SSRF bug |
|
|
|