Explore >> Select a destination


You are here

jorgectf.github.io
| | foxglovesecurity.com
10.1 parsecs away

Travel
| | By @jstnkndy While looking for bugs in a target recently I came across a host that was running Expression Engine, a content management platform. This specific application caught my eye because upon attempting to login to the application with the username 'admin', the server responded with a cookie that contained PHP serialized data....
| | pwning.systems
9.7 parsecs away

Travel
| | It is likely that we have all seen PHP filters that prevent us from encountering vulnerabilities. Here in this blog post, I'll walk you through my thought process for bypassing a filter by looking for a bug in the filter itself in order to reach a bug! Let's pretend we have the following code, which passes some user-input to filter_var() and uses the FILTER_VALIDATE_DOMAIN or FILTER FLAG HOSTNAME flag. This adds the functionality to validate hostnames on a per-host rationale (this means that they must begin with an alphanumeric character and must contain only alphanumerics or hyphens throughout their entire length).
| | www.evonide.com
12.1 parsecs away

Travel
| | Implementation of a fuzzer to find vulnerabilities in PHP's unserialize function. This helped us to earn a $20,000 bug bounty from Pornhub on Hackerone.
| | www.promptingguide.ai
33.2 parsecs away

Travel
| A Comprehensive Overview of Prompt Engineering