Open in app

Sign In

Write

Sign In

Shaurya Sharma
Shaurya Sharma

788 Followers

Home

About

Sep 15, 2022

Secure Software Development Life Cycle-101

What is SDLC? SDLC is Software Development life cycle, it is a structured process for planning, creating, testing and deploying highest quality and lowest cost software in the shortest possible production time. SDLC allows developers to analyze the product requirements and also helps in reducing unnecessary costs during development. Developers now…

Startup

3 min read

Secure Software Development Life Cycle-101
Secure Software Development Life Cycle-101
Startup

3 min read


Jun 29, 2021

Privilege escalation through insecure configuration.

First of all, let’s deal with the insecure configuration. To begin with, IT professionals often use manuals and resources like StackOverflow, many of which contain insecure commands and configs. A striking example is a news that the code most copied from StackOverflow contained an error. An experienced admin will see…

Hacking

9 min read

Privilege escalation through insecure configuration.
Privilege escalation through insecure configuration.
Hacking

9 min read


Jun 1, 2021

Cracking JWT signature

I am testing an API that uses JWT for authentication. This JWT is signed HS256 to prevent modification. I figured that if I define the secret key used in this signature, I can create my own JWTs. How can I crack the JWT’s private signing key? I ended up using…

Cracking

2 min read

Cracking JWT signature
Cracking JWT signature
Cracking

2 min read


Mar 23, 2021

Automate WordPress recon for Bug Bounty | WordPress:Cheat sheet

WordPress is a fairly large and complex product, with its own pros and cons, so there are a sufficient number of tools that allow you to automate routine tasks. Nmap: * Version and theme detection using http-wordpress-info script nmap -sV --script http-wordpress-info * Password selection by dictionaries nmap -p80 --script…

Word Press

2 min read

Automate WordPress recon for Bug Bounty | WordPress:Cheat sheet
Automate WordPress recon for Bug Bounty | WordPress:Cheat sheet
Word Press

2 min read


Feb 24, 2021

Bypassing WAF with incorrect proxy settings for Hunting Bugs.

Let’s Suppose the target system has the address-: "Https: // targetdomain" By accident, I noticed that some CSS and JavaScript resources were available on the subdomain responsible for authenticating on the site. The odd thing was that while browsing the end node (something like) I received an HTTP 404 response…

Bug Bounty

2 min read

Bypassing WAF with incorrect proxy settings for Hunting Bugs.
Bypassing WAF with incorrect proxy settings for Hunting Bugs.
Bug Bounty

2 min read


Feb 7, 2021

Analysis of VoIP calls in Wireshark.

SIP messaging process The most revealing will, of course, be the exchange of signaling messages and traffic. Telephony → SIP Flows Here you will see all calls from this dump.

Voip

3 min read

Analysis of VoIP calls in Wireshark.
Analysis of VoIP calls in Wireshark.
Voip

3 min read


Published in InfoSec Write-ups

·Apr 14, 2020

Bounty Tip !! Easiest way to bypass API’s Rate Limit.

What is Rate Limit ? Rate limiting is used to control the amount of incoming and outgoing traffic from a network. If you are using a particular API that is configured to allow 100 requests/minute. If the number of requests you make exceeds that limit, then an error will be triggered I was recently invited…

Api Hacking

2 min read

Bounty Tip !! Easiest way to bypass API’s Rate Limit.
Bounty Tip !! Easiest way to bypass API’s Rate Limit.
Api Hacking

2 min read


Published in InfoSec Write-ups

·Apr 3, 2020

Bounty Tip: How to bypass authorization in SAML !

Security Assertion Markup Language (SAML) is an open XML-based standard for exchanging authentication and authorization data between process parties Vulnerabilities are affected by the decisions of various SSO providers and several libraries using SAML SSO (Single Sign-On). Using the SAML protocol, users can access many of their cloud applications with…

Bugbounting

2 min read

Bounty Tip: How to bypass authorization in SAML !
Bounty Tip: How to bypass authorization in SAML !
Bugbounting

2 min read


Published in InfoSec Write-ups

·Mar 22, 2020

Bounty Tip- Open redirection escalated further into an XSS !!

What is Open Redirection? An Open Redirection is when a web application or server uses an invalidated user-submitted link to redirect the user to a given website or page. Even though it seems like a harmless action to let a user decide to which page he wants to be redirected. What is XSS? Cross-site scripting is a…

Bug Bounty

2 min read

Bounty Tip- Open redirection escalated further into an XSS !!
Bounty Tip- Open redirection escalated further into an XSS !!
Bug Bounty

2 min read


Published in InfoSec Write-ups

·Mar 19, 2020

Everything you want to know about IOT Security ! Simplified

The Internet of things is a network of devices that are connected to the Internet, controlled through it, and can exchange data with each other. IoT devices can directly connect to internet through wireless or wired communication or they can connect using an IoT gateway, the use of the gateway…

Io T

3 min read

Everything you want to know about IOT Security ! Simplified
Everything you want to know about IOT Security ! Simplified
Io T

3 min read

Shaurya Sharma

Shaurya Sharma

788 Followers

Security Researcher | DevSecOps | Twitter:-https://twitter.com/ShauryaSharma05

Following
  • Vickie Li

    Vickie Li

  • Cristi Vlad

    Cristi Vlad

  • Chenny Ren

    Chenny Ren

  • Aditya Soni

    Aditya Soni

  • Sean (zseano)

    Sean (zseano)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech