Open in app

Sign in

Write

Sign in

mrpentestguy
mrpentestguy

160 Followers

Home

About

Pinned

How I found a Command injection bug

Hey, guys today I want to show you how I was able to find a command injection bug through fuzzing. So let's get started What is Command injection? So according to OWASP, a Command injection is an attack in which the goal is the execution of arbitrary commands on the host operating system via…

Command Injection

3 min read

How I found a Command injection bug
How I found a Command injection bug
Command Injection

3 min read


Dec 27, 2021

OSINT Series … Part-1

What is OSINT ? OSINT is intelligence “drawn from publicly available material”, according to the CIA. Most intelligence experts extend that definition to mean information intended for public consumption. The CIA says that OSINT includes information gathered from the internet, mass media, specialist journals and research, photos, and geospatial information…

Maps

4 min read

OSINT Series … Part-1
OSINT Series … Part-1
Maps

4 min read


Oct 19, 2021

Remote code execution (RCE)

What is an RCE attack? An intrusion by remote code execution (RCE) occurs when an adversary is unauthorized to illicit access and control a device or server. Most of the time malware is used to take over the system. What does RCE mean? RCE refers to the mechanism by which a network flaw is abused by an agent to…

Rce

3 min read

Remote code execution (RCE)
Remote code execution (RCE)
Rce

3 min read


Oct 11, 2021

Blind SQL Injection

Today we will learn how we can find blind SQL injection and also at the end I will give you small automation where you can find some bugs with it. So let's get started What is a SQL injection? A SQL injection is a web application attack where the attacker “injects” SQL statements that will…

Sqli

3 min read

Sqli

3 min read


Published in

CodeX

·Sep 30, 2021

Different types of BruteForce attacks

What is a Brute Force Attack? In a brute force attack, a threat actor tries to gain access to sensitive data and systems by systematically trying as many combinations of usernames and guessed passwords as possible. If successful, the actor can enter the system masquerading as the legitimate user and remain inside until they are detected…

Brute Force Attack

4 min read

Different types of BruteForce attacks
Different types of BruteForce attacks
Brute Force Attack

4 min read


Sep 16, 2021

How I was able to find 100+ XSS in the United nations Bug Bounty Program

Hey, Guys so this is my first blog. so I thought maybe give it try to show people how you could find bugs in an easy way So let's get started First After my recon for 4 days. I started to look for URLs. URLs of your choice may be…

Infosec

3 min read

How I was able to find 100+ XSS in United nations Bug Bounty Program
How I was able to find 100+ XSS in United nations Bug Bounty Program
Infosec

3 min read

mrpentestguy

mrpentestguy

160 Followers

Security Researcher | Bug Bounty hunter | Security Engineer | CTF player | OSINT

Following
  • Jerry Shah (Jerry)

    Jerry Shah (Jerry)

  • BrownBearSec

    BrownBearSec

  • neelam

    neelam

  • Immunefi

    Immunefi

  • Alex Birsan

    Alex Birsan

See all (48)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams