Open in app
Home
Notifications
Lists
Stories

Write
Albus Security
Albus Security

Home

About

Jun 30

AlbusSec:- Penetration-List BeetleShell

Hi Information Security folk, I hope you liked my previous article that was on Log4 Shell Vulnerability. However, Today Is a very special day or Special Article for me, and for those Who Follow the Penetration-list. This Article is the end of the Penetration-List with lots of vulnerabilities, therefore Today…

Bug Bounty Tips

12 min read

AlbusSec:- Penetration-List BeetleShell
AlbusSec:- Penetration-List BeetleShell

Jun 26

AlbusSec:- Penetration-List 14 Log4shell — Sample

Hi Information Security folk, I hope you liked my previous article that was on Application Programming Interface(API) Vulnerabilities. However, Today We’ll learn about a very popular vulnerability found on 10 December called Log4shell. Log4Shell (CVE-2021–44228) was a zero-day vulnerability discovered on the apache log4j framework, with the help of log4shell…

Bug Bounty Writeup

6 min read

AlbusSec:- Penetration-List 14 Log4shell — Sample
AlbusSec:- Penetration-List 14 Log4shell — Sample

Jun 24

AlbusSec:- Penetration-List 13 GraphQL Vulnerabilities — Sample

Hi Information Security folk, I hope you liked my previous article that was on Application Programming Interface(API) Vulnerabilities. However, Today We’ll learn about how many vulnerabilities were found in a very popular query language called Graphql. As We knew whenever new technology was found then new vulnerabilities were also arising…

Bugbounty Writeup

5 min read

AlbusSec:- Penetration-List 13 GraphQL Vulnerabilities — Sample
AlbusSec:- Penetration-List 13 GraphQL Vulnerabilities — Sample

Jun 18

AlbusSec:- Penetration-List 12 API Vulnerabilities — Sample

Hi Information Security folk, I hope you liked my previous article that was on Cross-Origin-Resource-Sharing(CORS) Misconfiguration. However, Today We’ll learn about API vulnerabilities. But In this article, I’ll teach you basic stuff for API not deep because After completing Penetration-List. then I’ll start the API penetration testing articles series, I’ll…

Bug Bounty

6 min read

AlbusSec:- Penetration-List 011 API Vulnerabilities  — Sample
AlbusSec:- Penetration-List 011 API Vulnerabilities  — Sample

Jun 13

AlbusSec:- Penetration-List 011 CORS Misconfiguration — Sample

Hi Information Security folk, I hope you liked my previous articles that were on HTML-Injection. However, Today We’ll learn about Cross-Origin-Resource-Sharing Misconfiguration, In which I’ll teach about this misconfiguration, How You’ll detect this vulnerable on the server, and How You’ll Easily write an exploit for this misconfiguration to retrieve Tokens…

Bugbounty Writeup

7 min read

AlbusSec:- Penetration-List 011 CORS Misconfiguration — Sample 1
AlbusSec:- Penetration-List 011 CORS Misconfiguration — Sample 1

Jun 10

AlbusSec:- Penetration-List 010 HTML INJECTION— Sample

Hi Information Security folk, I hope you like my previous article that was on Server-Side-Request-Forgery(SSRF). However, Today we’ll learn about HTML-INJECTION, Before We start firstly, I will introduce myself. So, I’m Aniket Tyagi and I’m an Information Technology officer at the 5f eco foundation of India, an Information Security Researcher…

Bug Bounty Tips

4 min read

AlbusSec:- Penetration-List 010 HTML INJECTION— Sample
AlbusSec:- Penetration-List 010 HTML INJECTION— Sample

Jun 10

AlbusSec:- Penetration-List 09 Server-Side-Request-Forgery(SSRF) — Sample

Hi Information Security folk, I hope you like my previous article that was on CSRF(Cross-Side-Request-Forgery). Before We, go to the next topic, I would like to tell you something In the “penetration-List” Project, A new member was joined her name is “Sourav Chakraborty”. However, Today we’ll learn about Server-Side-Request-Forgery(SSRF). Firstly…

Bug Bounty Writeup

6 min read

AlbusSec:- Penetration-List 08 Server-Side-Request-Forgery(SSRF)  — Sample
AlbusSec:- Penetration-List 08 Server-Side-Request-Forgery(SSRF)  — Sample

Jun 6

AlbusSec:- Penetration-List 08 Cross-Side-Request-Forgery(CSRF) — Sample-2

Hi Information Security folk, I hope you are well and doing great in your life, Before we go to the next step, You’ll need to learn about CSRF Vulnerability, therefore check our previous article on csrf, However, Today we’ll learn about CSRF-Bypass-Technique’s. Where I’ll teach You Some-Basic bypass techniques to…

Bug Bounty

4 min read


May 26

AlbusSec:- Penetration-List 08 Cross-Side-Request-Forgery(CSRF) — Sample

Hi Information Security folk, I hope you are well and doing great in your life, Also I hope You liked my previous article about Command-Injection. However, Today we’ll learn about Client-Side-Request-Forgery(CSRF). Where I’ll teach You Basic knowledge about CSRF, Exploitation, Bypass, and Real World scenarios. However. Firstly, I will introduce…

Bug Bounty

4 min read

AlbusSec:- Penetration-List 07 Cross-Side-Request-Forgery(CSRF) — Sample
AlbusSec:- Penetration-List 07 Cross-Side-Request-Forgery(CSRF) — Sample

May 23

AlbusSec:- Penetration-List 07 Command Injection — Sample

Hi Information Security folk, I hope you liked the SQL-Injection Sample Series, Where You learned about SQL-Injection In-depth, However, In today’s article we’ll start learning about Command Injection also known as Remote Command Execution, not Remote Code Execution. Firstly, I will introduce myself. So, I’m Aniket Tyagi and I’m an…

Bug Bounty Program

4 min read

AlbusSec:- Penetration-List 06 Command Injection — Sample
AlbusSec:- Penetration-List 06 Command Injection — Sample
Albus Security

Albus Security

Privacy Is The Best Freedom

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable