Ishara AbeythissaJWT Exploit “KID” | Privilege Escalation | Ishara AbeythissaHello everyone, today we will look at another intriguing method of hacking JWT Tokens utilizing the (ab)using the kid claim and use it to…Jun 28, 20211Jun 28, 20211
Ishara AbeythissaSUDO Privileges at initctl| Privileges Escalation Technique | Ishara Abeythissainitctl admit with System Administrators to link & communicate with Upstart. Able to manage user jobs. As example If D-Bus has been…Mar 2, 20211Mar 2, 20211
Ishara AbeythissaAndroid’s RootBeer Library BypassThis post is to follow up how to bypass RootBeer Library on Android. Let me give you brief idea what is actually RootBeer. RootBeer an…Feb 11, 2021Feb 11, 2021
Ishara AbeythissaCommand Injection — preg_replace() PHP Function exploitToday we gonna exploit most commonly using php function called preg_replace.Feb 9, 2020Feb 9, 2020
Ishara AbeythissaBlind SQL Injection | Triggering Conditional Response | Part 1 | Ishara Abeythissa@TH3VeNoMNov 20, 2019Nov 20, 2019
Ishara AbeythissaHACKTHEBOX — CRYPTO : BANK-HEIST | Done by VENOME1995Hey guys today I’m did write up about bank-heist on HacktheBox. So as you can see under the description it is definitely related to…Nov 12, 2019Nov 12, 2019
Ishara AbeythissaCVE-2019–14287 | SUDO will hit your rootSUDO provide most powerful mechanism inside LINUX environment. SUDO (superuser do) is a utility for UNIX- and Linux-based systems that…Oct 19, 2019Oct 19, 2019
Ishara AbeythissaVulnserver Walk-through Part 1| OSCP Hands-on Technique | Done by Ishara AbeythissaNow we gonna exploit application called vulnserver which will be really helpful for OSCP practical sessions. For this I’m going to use…Sep 8, 20191Sep 8, 20191