How Abusing AWS CloudFormation Led to a Total Takeover of an AWS Environment |
|
|
|
How i was able to get Account Takeover via Insecure Data Storage and WebView With Exported Activity |
|
|
|
How I get 1000$ bounty for Discovering Account Takeover in Android Application |
|
|
|
SSO Gadgets II: Unauthenticated Client-Side Template Injection to Account Takeover using SSO Gadget Chain |
|
|
|
Bug Writeup: Stored XSS to Account Takeover (ATO) via GraphQL API |
|
|
|
A Classical Account Takeover Case via Multiple Bypasses |
|
|
|
Account Takeover: Unraveling IDOR + Stored XSS Flaws in an NFT Marketplace |
|
|
|
ServiceNow Insecure Access Control To Full Admin Takeover |
|
|
|
How I Hacked Scopely and Got $$$ |
|
|
|
nOAuth: How Microsoft OAuth Misconfiguration Can Lead to Full Account Takeover |
|
|
|
Unleashing the Cloud: A Journey into Hacking College Servers and Uncovering Security Vulnerabilities |
|
|
|
From Bug Bounty Hunter to Risk Analyst: My Cybersecurity Journey at Deloitte |
|
|
|
Abusing Client-Side Desync on Werkzeug |
|
|
|
Compromising Honda’s power equipment / marine / lawn & garden dealer eCommerce platform through a vulnerable password reset API |
|
|
|
How I was able to get account takeover via IDOR form JWT |
|
|
|
Turning a 50$ Tab-Nabbing vulnerability into a 1000$ Account takeover |
|
|
|
Breaking TikTok: Our Journey to Finding an Account Takeover Vulnerability |
|
|
|
Rate Limit Bypass Leads to 0 Click ATO |
|
|
|
Critical vulnerability on TP-Link service or how I got 0$ |
|
|
|
Hunting For Password Reset Tokens By Spraying And Using HTTP Pipelining |
|
|
|
Salt Labs exposes a new vulnerability in popular OAuth framework, used in hundreds of online services |
|
|
|
Official extension spoofing attacks: when trusted add-ons are not so trusted |
|
|
|
From GitHub To Account Takeover: Misconfigured Actions Place GCP & AWS Accounts At Risk |
|
|
|
Subdomain Takeover leading to Full Account Takeover |
|
|
|
Privilege Escalations through Integrations |
|
|
|