penetration-testing

7 articles
Sort: New Top Best
clear filter
0

Redcentric offers comprehensive penetration testing services including infrastructure, application, mobile, and social engineering assessments to identify and remediate security vulnerabilities before exploitation. Their approach combines manual testing techniques with business logic analysis to provide actionable security insights and regulatory compliance support.

Redcentric
7elements.co.uk · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0

A SQL injection vulnerability was discovered in the login endpoint of bootcamp.nutanix.com where unsanitized user input in the email and password JSON parameters allowed extraction of database version information via error-based SQLi techniques. The vulnerability was exploited using simple quote injection and extractvalue() functions to trigger MySQL errors revealing system details.

bootcamp.nutanix.com Nutanix Muhammad Khizer Javed Burp Suite SQLmap MySQL 8.0.11 Express.js HackerOne Bugcrowd
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0

A case study demonstrating Oracle SQL injection exploitation techniques using string concatenation operators and the rownum function to bypass filtering of CASE statements and special characters. The attacker enumerated column names and extracted data through blind SQL injection despite character restrictions on underscores, parentheses, whitespace, and other special characters.

Oracle PostgreSQL IBM DB2 Informix pokleyzz yappare
blog.yappare.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0

Step-by-step exploitation of multiple SQL injection vulnerabilities in Oculus' website, demonstrating blind SQL injection techniques with whitespace and comma filtering bypass to extract admin session credentials. The attacker chained five SQL injections together, using creative MySQL syntax (comment blocks, OFFSET instead of comma-based LIMIT) to gain administrator access without prepared statements.

Oculus Facebook Josip Franjković Jon Bitquark developer.oculusvr.com CompanyAction.php Burp sqlmap
josipfranjkovic.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0

A writeup on bypassing a Web Application Firewall (WAF) to exploit a blind SQL injection vulnerability discovered during security research. The article documents the techniques used to evade WAF detection while exploiting the underlying database vulnerability.

Robin Verton Deutsche Telekom AG
robinverton.de · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0 4/10

A university implemented Pentest Wednesday® to measure the real-world impact of security improvements beyond traditional metrics, moving from phishing simulations to validating domain compromise risk and quantifying blast radius reduction.

Pentest Wednesday
horizon3.ai · Stephen Gates · 1 day ago · details
0 5/10

A penetration test discovering an XSS vulnerability in a custom-built AI chatbot that can be exploited to achieve zero-click account takeover without user interaction.

infosecwriteups.com · Rahul Singh Chauhan · 1 day ago · details