tutorialboy (29)in #smart • 2 years agoAn Introduction to Smart Contracts Hacking and AttacksSmart contracts occupy a separate niche in software development. They are small, immutable, visible to everyone, run…tutorialboy (29)in #cybersecurity • 2 years agoA Summary of Fuzzing Tools and Dictionaries For Bug Bounty HuntersIntroduction Testing for vulnerabilities by manually entering input can be unmanageable. In these days and age where…tutorialboy (29)in #cybersecurity • 2 years agoA Remote Code Execution in JXPath Library (CVE-2022-41852)Source :- On 6th October 2022 new CVE was released for critical vulnerability with the identifier…tutorialboy (29)in #cybersecurity • 2 years agoAndroid Security : A Checklist For Exploiting WebViewSource :- WebView is a web browser that can be built into an app, and represents the most widely used component…tutorialboy (29)in #cybersecurity • 2 years agoWhat is Web Fuzzing: How can Web Fuzzing useful in Pentest?Fuzzing is generally finding bugs/issues using automated scanning with supplying unexpected data into an application…tutorialboy (29)in #kuberntes • 3 years agoA Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)Source :- Introduction The attacker's perspective on K8S cluster security (Part 1) summarizes the attack…tutorialboy (29)in #xss • 3 years agoXSS vulnerabilities discovered in ServiceNow - CVE-2022-38463Source :- Hey everyone, This is a blog related to my recent CVE on ServiceNow. It was found while testing a bug…tutorialboy (29)in #kuberntes • 3 years agoA Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)Source :- Introduction As a representative of cloud-native management and orchestration systems, Kubernetes…tutorialboy (29)in #php • 3 years agoHow To Exploit PHP Remotely To Bypass Filters & WAF RulesThis is the first of two vulnerable PHP scripts that I’m going to use for all tests. This script is definitely too…