Categories
Cyber Security Security Code Review

Secure Code Review: Finding XML vulnerabilities in Code​ [1/2]

It’s been a while… It’s been a while since my last post due to various reasons. In the past few months my passion has shifted towards code security – security code review in general. Being able to read and find vulnerabilities in code is something a hacker(ethical)/folks in cybersecurity as well as developers should have […]

Categories
Bug Bounty

A tale of 2 bugs

Finding hidden gems. This is a story about how I came across 2 hidden gems during my recon phase. I want to emphasize that it hardly took me 20 minutes to find these bugs and they don’t require any interesting “hack”. I just looked at the right place and did the right thing. If you […]

Categories
Cyber Security

How hackers love your HTTP data

Showing how HTTPS is more secure. You have, at least once in your life come across the statement “Make sure xyz website uses HTTPS before entering your private information” Well, spoiler alert, it’s true. Quite an overreaction. But what is HTTP? The Hypertext Transfer Protocol (HTTP), is a system by which computers talk to each […]

Categories
Cyber Security

How you could get hacked at a coffee shop.

Note: This article is in connection with the previous article. So if you have not read that, go read it now — [https://www.muqsitbaig.com/blog/how-hackers-love-your-http-data/] Note 2: This article is only for educational and learning purposes. It gives you an idea why you should avoid using public networks as much as possible. You’ve come to your favourite […]