×
Site Menu
Everything
Hacker News
Hacking tools
KrebsOnSecurity
Threat Post
Security Affairs
Exploit
Security Trails
Cert Advisory
Technology
Hacking Articles
Port Swigger
Bug Bounty
IT Security News
Other
Crcaked Softwares
Malware
Security Videos
LEFT SIDEBAR AD
Hidden in mobile, Best for skyscrapers.
Writeups of All Apprentice Labs in Portswigger — All Lab’s Solution| Karthikeyan Nagaraj
11 months ago
76
BOOK THIS SPACE FOR AD
ARTICLE AD
18. Insecure Deserialization
What is Insecure deserialization?
In this section, we’ll cover what insecure deserialization is and describe how it can potentially expose websites to…
cyberw1ng.medium.com
18.1 Lab: Modifying serialized objects | 2023
This lab uses a serialization-based session mechanism and is vulnerable to privilege escalation as a result. To solve…
cyberw1ng.medium.com
19. GrapQL Vulnerabilities
GraphQL API Vulnerabilities in Web App Penetration Testing | 2023
In this section, we’ll explain what GraphQL is, describe some types, explain how to find and exploit various kinds of…
cyberw1ng.medium.com
19.1 Lab: Accessing private GraphQL posts | 2023
The blog page for this lab contains a hidden blog post that has a secret password. Find the hidden blog post and enter…
cyberw1ng.medium.com
20. HTTP Host Header Attacks
HTTP Host Header Attacks in Web App Penetration Testing | 2023
In this section, we’ll explain what Host Header Attack is, describe some types, explain how to find and exploit Host…
cyberw1ng.medium.com
Host HTTP Header Attacks: Safeguarding Against Vulnerabilities | 2023
Unveiling and Defending Against Host HTTP Header Vulnerabilities | Karthikeyan Nagaraj
cyberw1ng.medium.com
20.1 Lab: Basic password reset poisoning | 2023
This lab is vulnerable to password reset poisoning. The user Carlos will carelessly click on any links in emails that…
cyberw1ng.medium.com
20.2 Lab: Host header authentication bypass | 2023
This lab makes an assumption about the privilege level of the user based on the HTTP Host header. To solve the lab…
cyberw1ng.medium.com
21. OAuth Vulnerabilities
OAuth 2.0 Authentication Vulnerabilities in Web App Penetration Testing | 2023
In this section, we’ll explain what an OAuth Attack is, describe some types, explain how to find and exploit OAuth, and…
cyberw1ng.medium.com
21.1 Lab: Authentication bypass via OAuth implicit flow | 2023
This lab uses an OAuth service to allow users to log in with their social media accounts. Flawed validation by the…
cyberw1ng.medium.com
22. JWT Attacks
JWT attack vulnerabilities in Web App Penetration Testing | 2023
In this section, we’ll explain what an JWT Attack is, describe some types, explain how to find and exploit JWT, and…
cyberw1ng.medium.com
22.1 Lab: JWT authentication bypass via unverified signature | 2023
This lab uses a JWT-based mechanism for handling sessions. Due to implementation flaws, the server doesn’t verify the…
cyberw1ng.medium.com
22.2 Lab: JWT authentication bypass via flawed signature verification | 2023
This lab uses a JWT-based mechanism for handling sessions. The server is insecurely configured to accept unsigned JWTs…
cyberw1ng.medium.com
23.1 Lab: CORS vulnerability with trusted null origin | 2023
This website has an insecure CORS configuration in that it trusts the “null” origin.To solve the lab, craft some…
cyberw1ng.medium.com
23. CORS and Access Control
23.1 Lab: CORS vulnerability with trusted null origin | 2023
This website has an insecure CORS configuration in that it trusts the “null” origin.To solve the lab, craft some…
cyberw1ng.medium.com
23.2 Lab: User ID controlled by request parameter | 2023
This lab has a horizontal privilege escalation vulnerability on the user account page. To solve the lab, obtain the API…
cyberw1ng.medium.com
23.3 Lab: User ID controlled by request parameter, with unpredictable user IDs | 2023
This lab has a horizontal privilege escalation vulnerability on the user account page, but identifies users with GUIDs…
cyberw1ng.medium.com
Read Entire Article
Homepage
Bug Bounty
Writeups of All Apprentice Labs in Portswigger — All Lab’s Solution| Karthikeyan Nagaraj
Related
My step by step process on how I do Bug Bounty Hunting: From finding targets to Submission of the…
Uncovering Vulnerabilities: My Discovery of Hashed Passwords on a Dutch Government Website
Information Disclosure in Top 500 Company through Source Code
WordPress Penetration Testing: A Hacker’s Playbook
How to install WhatWeb & usage samples.
Exploiting BAC: Unlimited Likes in Comment Sections
Trending
1.
Abhimanyu Easwaran
2.
Rahul Chahar
3.
Chennai
4.
Russian
5.
Emerging Asia Cup
6.
Kerala Blasters vs Bengaluru
7.
Zeeshan Siddique
8.
Yashasvi Jaiswal
9.
Do Patti
10.
Afcons Infrastructure IPO GMP
Popular
1-click RCE in Electron Applications
Install waybackurls on Kali Linux
Microsoft Office Professional Plus 2019 (x64 & x86) Multilingual + Pre-Activated
Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys
Install DalFox on Kali Linux
Adobe Master Collection CC 2022 v25.08.2022 (x64) Multilingual Pre-Activated
Maxon CINEMA 4D Studio S22.123 (x64) Multilingual + Crack
‘We are not motivated by profits’ – Open Bug Bounty maintainers on finding a niche in the crowdsourced AppSec market
Just Gopher It: Escalating a Blind SSRF to RCE for $15k
SketchUp Pro 2020 v20.2.172 (x64) Multilingual + Patch
BOOK THIS SPACE FOR AD
RIGHT SIDEBAR BOTTOM AD