Open in app

Sign In

Write

Sign In

Albus Security
Albus Security

212 Followers

Home

About

Aug 21, 2022

Introduction to API Penetration

Hi Security folk, I’m back with another Topic named “ API Penetration Testing” in which you’ll learn about the Basic ethics of API Working, and how API works. So, while you get API dev perspective knowledge, We’ll go for the testing perspective. In which you’ll learn how to start with…

1 min read

Introduction to API Penetration
Introduction to API Penetration

1 min read


Jun 30, 2022

AlbusSec:- Penetration-List BeetleShell

Hi Information Security folk, I hope you liked my previous article that was on Log4 Shell Vulnerability. However, Today Is a very special day or Special Article for me, and for those Who Follow the Penetration-list. This Article is the end of the Penetration-List with lots of vulnerabilities, therefore Today…

Bug Bounty Tips

12 min read

AlbusSec:- Penetration-List BeetleShell
AlbusSec:- Penetration-List BeetleShell
Bug Bounty Tips

12 min read


Jun 26, 2022

AlbusSec:- Penetration-List 14 Log4shell — Sample

Hi Information Security folk, I hope you liked my previous article that was on Application Programming Interface(API) Vulnerabilities. However, Today We’ll learn about a very popular vulnerability found on 10 December called Log4shell. Log4Shell (CVE-2021–44228) was a zero-day vulnerability discovered on the apache log4j framework, with the help of log4shell…

Bug Bounty Writeup

6 min read

AlbusSec:- Penetration-List 14 Log4shell — Sample
AlbusSec:- Penetration-List 14 Log4shell — Sample
Bug Bounty Writeup

6 min read


Jun 24, 2022

AlbusSec:- Penetration-List 13 GraphQL Vulnerabilities — Sample

Hi Information Security folk, I hope you liked my previous article that was on Application Programming Interface(API) Vulnerabilities. However, Today We’ll learn about how many vulnerabilities were found in a very popular query language called Graphql. As We knew whenever new technology was found then new vulnerabilities were also arising…

Bugbounty Writeup

5 min read

AlbusSec:- Penetration-List 13 GraphQL Vulnerabilities — Sample
AlbusSec:- Penetration-List 13 GraphQL Vulnerabilities — Sample
Bugbounty Writeup

5 min read


Jun 18, 2022

AlbusSec:- Penetration-List 12 API Vulnerabilities — Sample

Hi Information Security folk, I hope you liked my previous article that was on Cross-Origin-Resource-Sharing(CORS) Misconfiguration. However, Today We’ll learn about API vulnerabilities. But In this article, I’ll teach you basic stuff for API not deep because After completing Penetration-List. then I’ll start the API penetration testing articles series, I’ll…

Bug Bounty

6 min read

AlbusSec:- Penetration-List 011 API Vulnerabilities  — Sample
AlbusSec:- Penetration-List 011 API Vulnerabilities  — Sample
Bug Bounty

6 min read


Jun 13, 2022

AlbusSec:- Penetration-List 011 CORS Misconfiguration — Sample

Hi Information Security folk, I hope you liked my previous articles that were on HTML-Injection. However, Today We’ll learn about Cross-Origin-Resource-Sharing Misconfiguration, In which I’ll teach about this misconfiguration, How You’ll detect this vulnerable on the server, and How You’ll Easily write an exploit for this misconfiguration to retrieve Tokens…

Bugbounty Writeup

7 min read

AlbusSec:- Penetration-List 011 CORS Misconfiguration — Sample 1
AlbusSec:- Penetration-List 011 CORS Misconfiguration — Sample 1
Bugbounty Writeup

7 min read


Jun 10, 2022

AlbusSec:- Penetration-List 010 HTML INJECTION— Sample

Hi Information Security folk, I hope you like my previous article that was on Server-Side-Request-Forgery(SSRF). However, Today we’ll learn about HTML-INJECTION, Before We start firstly, I will introduce myself. So, I’m Aniket Tyagi and I’m an Information Technology officer at the 5f eco foundation of India, an Information Security Researcher…

Bug Bounty Tips

4 min read

AlbusSec:- Penetration-List 010 HTML INJECTION— Sample
AlbusSec:- Penetration-List 010 HTML INJECTION— Sample
Bug Bounty Tips

4 min read


Jun 10, 2022

AlbusSec:- Penetration-List 09 Server-Side-Request-Forgery(SSRF) — Sample

Hi Information Security folk, I hope you like my previous article that was on CSRF(Cross-Side-Request-Forgery). Before We, go to the next topic, I would like to tell you something In the “penetration-List” Project, A new member was joined her name is “Sourav Chakraborty”. However, Today we’ll learn about Server-Side-Request-Forgery(SSRF). Firstly…

Bug Bounty Writeup

6 min read

AlbusSec:- Penetration-List 08 Server-Side-Request-Forgery(SSRF)  — Sample
AlbusSec:- Penetration-List 08 Server-Side-Request-Forgery(SSRF)  — Sample
Bug Bounty Writeup

6 min read


Jun 6, 2022

AlbusSec:- Penetration-List 08 Cross-Side-Request-Forgery(CSRF) — Sample-2

Hi Information Security folk, I hope you are well and doing great in your life, Before we go to the next step, You’ll need to learn about CSRF Vulnerability, therefore check our previous article on csrf, However, Today we’ll learn about CSRF-Bypass-Technique’s. Where I’ll teach You Some-Basic bypass techniques to…

Bug Bounty

4 min read

Bug Bounty

4 min read


May 26, 2022

AlbusSec:- Penetration-List 08 Cross-Side-Request-Forgery(CSRF) — Sample

Hi Information Security folk, I hope you are well and doing great in your life, Also I hope You liked my previous article about Command-Injection. However, Today we’ll learn about Client-Side-Request-Forgery(CSRF). Where I’ll teach You Basic knowledge about CSRF, Exploitation, Bypass, and Real World scenarios. However. Firstly, I will introduce…

Bug Bounty

4 min read

AlbusSec:- Penetration-List 07 Cross-Side-Request-Forgery(CSRF) — Sample
AlbusSec:- Penetration-List 07 Cross-Side-Request-Forgery(CSRF) — Sample
Bug Bounty

4 min read

Albus Security

Albus Security

212 Followers

Privacy Is The Best Freedom

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech