JWT Exploit “KID” | Privilege Escalation | Ishara AbeythissaHello everyone, today we will look at another intriguing method of hacking JWT Tokens utilizing the (ab)using the kid claim and use it to…Jun 28, 2021A response icon1Jun 28, 2021A response icon1
SUDO Privileges at initctl| Privileges Escalation Technique | Ishara Abeythissainitctl admit with System Administrators to link & communicate with Upstart. Able to manage user jobs. As example If D-Bus has been…Mar 2, 2021A response icon1Mar 2, 2021A response icon1
Android’s RootBeer Library BypassThis post is to follow up how to bypass RootBeer Library on Android. Let me give you brief idea what is actually RootBeer. RootBeer an…Feb 11, 2021Feb 11, 2021
Command Injection — preg_replace() PHP Function exploitToday we gonna exploit most commonly using php function called preg_replace.Feb 9, 2020Feb 9, 2020
Blind SQL Injection | Triggering Conditional Response | Part 1 | Ishara Abeythissa@TH3VeNoMNov 20, 2019Nov 20, 2019
HACKTHEBOX — CRYPTO : BANK-HEIST | Done by VENOME1995Hey guys today I’m did write up about bank-heist on HacktheBox. So as you can see under the description it is definitely related to…Nov 12, 2019Nov 12, 2019
CVE-2019–14287 | SUDO will hit your rootSUDO provide most powerful mechanism inside LINUX environment. SUDO (superuser do) is a utility for UNIX- and Linux-based systems that…Oct 19, 2019Oct 19, 2019
Handy-Shellcode | picoCTF 2019done by Ishara AbeythissaOct 5, 2019A response icon2Oct 5, 2019A response icon2
Vulnserver Walk-through Part 1| OSCP Hands-on Technique | Done by Ishara AbeythissaNow we gonna exploit application called vulnserver which will be really helpful for OSCP practical sessions. For this I’m going to use…Sep 8, 2019A response icon1Sep 8, 2019A response icon1