Assalamu Alaikum , Hey there I'm Robiul Awal Fagun aka 0xRobiul and you all know &q…
0xRobiul - Blog
Student | Red Teaming | MCRTA | PEH | JPT | PenTest+ | ISO 27001 A. | CAP | CNSP | CCSP-AWS | CNPen
Latest Posts
What Is CSRF? Cross site Request Forgery (CSRF) also known as XSRF , Sea Surf or Sessio…
What Does "Privilege Escalation" Mean? At it's core, Privilege Escalation …
Hidden API Functionality Exposure Application programming interfaces (APIs) have become a…
Broken Link Hijacking How To Hunt 1. Manually find and click external links on the target…
Subdomain Enumeration Well, subdomain enumeration is important when you are hunting on w…
How To Clone SIM Card Things Required : Blank Programmable SIM Card: I got this one from…
XSS Via X-Forwarded-Host Let’s understand, what is the X-Forwarded-Host header? The HTTP …
File Upload Bypass It is when the server validates the file that is uploaded by comparin…
Miscellaneous Attack Via File Upload 1. CSV Injection 2. File Overwrite 3. Pixel Flood At…
Exif MetaData Leakage It occurs when a user uploads an image in example.com, the uploaded…
Open Redirect Via File Upload Open Redirect with the File Upload functionality is not wi…
CSRF Via File Upload Cross-Site Request Forgery (CSRF) is an attack that forces authenti…
XSS Via File Upload While performing testing on file upload functionality, there are mul…
XXE Via File Upload The file upload functionality, opens the gateway for the XML Externa…
SSRF Via File Upload Server-Side Request Forgery is one of the very interesting and impac…
RCE Via File Upload One of the most interesting attacks that come into mind whenever the…
More posts