Hello, Today’s topic is 403 bypass I’ve been working on the HTTP protocol for a while. After checking and researching, I discovered that version 1.0 of the HTTP protocol can be used to bypass 403. I’ve always had problems with people who write articles. You add so many explanations that you get tired of reading […]
CLICKJACKING Worth $1800
In this write-up, I will speak approximately how I earned a complete of $1800 through exploiting Clickjacking on pages in which User touchy statistics became disclosed, It became a non-public software on Bugcorwd.So there have been a few API endpoints, which have been disclosing User Information like Credit Card Data, Email, Name, Phone, Address, User […]
CORS -How do I find Cross-origin Resource Sharing Vulnerability?
What is CORS? A Cross-Origin Resource Sharing (CORS) policy for HTML5 controls whether and how content running on other domains can make a two-way interaction with the domain that publishes the policy. The policy is granular and access controls can be applied per request based on the URL and other properties of the request. Relying […]