exploitation-technique

3 articles
sort: new top best
clear filter
0 7/10

A step-by-step walkthrough of exploiting boolean-based SQL injection through the User-Agent HTTP header to enumerate database version, table names, column names, and extract user credentials from a MariaDB database.

fr0stNuLL MySQL MariaDB Oracle MicrosoftSQL
medium.com · kh4sh3i/bug-bounty-writeups · 19 hours ago · details
0 8/10

Technical writeup on exploiting SQL injection in INSERT/UPDATE queries when commas are forbidden by application logic, using CASE WHEN statements with LIKE operators and CAST functions to perform time-based blind SQL injection without comma delimiters. Includes working payload and automated Python exploit script.

Ahmed Sultan Redforce Web Security Detectify
blog.redforce.io · devanshbatham/Awesome-Bugbounty-Writeups · 19 hours ago · details
0 8/10

Technical writeup demonstrating how to identify and exploit 55,000+ subdomain takeover vulnerabilities on Shopify by analyzing CNAME records pointing to Shopify's infrastructure, including two exploitation methods (application name mapping and DNS mapping) with step-by-step methodology and large-scale scanning techniques.

Shopify buckhacker FDNS Dataset Project Sonar HackerOne
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 19 hours ago · details