Ishara AbeythissaJWT Exploit “KID” | Privilege Escalation | Ishara AbeythissaHello everyone, today we will look at another intriguing method of hacking JWT Tokens utilizing the (ab)using the kid claim and use it to…3 min read·Jun 28, 2021--1--1
Ishara AbeythissaSUDO Privileges at initctl| Privileges Escalation Technique | Ishara Abeythissainitctl admit with System Administrators to link & communicate with Upstart. Able to manage user jobs. As example If D-Bus has been…2 min read·Mar 2, 2021--1--1
Ishara AbeythissaAndroid’s RootBeer Library BypassThis post is to follow up how to bypass RootBeer Library on Android. Let me give you brief idea what is actually RootBeer. RootBeer an…3 min read·Feb 11, 2021----
Ishara AbeythissaCommand Injection — preg_replace() PHP Function exploitToday we gonna exploit most commonly using php function called preg_replace.3 min read·Feb 9, 2020----
Ishara AbeythissaBlind SQL Injection | Triggering Conditional Response | Part 1 | Ishara Abeythissa@TH3VeNoM4 min read·Nov 20, 2019----
Ishara AbeythissaHACKTHEBOX — CRYPTO : BANK-HEIST | Done by VENOME1995Hey guys today I’m did write up about bank-heist on HacktheBox. So as you can see under the description it is definitely related to…2 min read·Nov 12, 2019----
Ishara AbeythissaCVE-2019–14287 | SUDO will hit your rootSUDO provide most powerful mechanism inside LINUX environment. SUDO (superuser do) is a utility for UNIX- and Linux-based systems that…2 min read·Oct 19, 2019----
Ishara AbeythissaVulnserver Walk-through Part 1| OSCP Hands-on Technique | Done by Ishara AbeythissaNow we gonna exploit application called vulnserver which will be really helpful for OSCP practical sessions. For this I’m going to use…5 min read·Sep 8, 2019--1--1