Open in app

Sign in

Write

Sign in

RoadToOSCP

88 Followers

Home

About

Nov 25

Easy Wi-Fi Hacking

Introduction: Wi-Fi has become an integral part of our daily lives, enabling us to connect to the internet from anywhere, anytime. However, with the increasing popularity of Wi-Fi, there has been a surge in Wi-Fi hacking incidents. In this content, we will delve into the world of Wi-Fi hacking, understanding the…

Wifihacking

5 min read

Easy Wi-Fi Hacking
Easy Wi-Fi Hacking
Wifihacking

5 min read


Sep 30

Exploiting Keepass

In an era where cybersecurity threats are increasingly sophisticated, the importance of secure password management cannot be overstated. Password managers like KeePass aim to protect our sensitive information, but they are not immune to vulnerabilities. …

Penetration Testing

3 min read

Exploiting Keepass
Exploiting Keepass
Penetration Testing

3 min read


Aug 27

Sudoedit Local Privilege Escalation Vulnerability (CVE-2023–22809)

On January 18th, 2023, Synacktiv released an advisory regarding a vulnerability in sudo (CVE-2023–22809). This vulnerability allows users to escalate their privilege. Once a user has sudo privilege it’s pointless to say that is “what all he can do in that system”!!!! But to exploit the vulnerability It requires two…

Pentesting

3 min read

Sudoedit Local Privilege Escalation Vulnerability (CVE-2023–22809)
Sudoedit Local Privilege Escalation Vulnerability (CVE-2023–22809)
Pentesting

3 min read


Jul 9

Exploiting Ultimate Member WordPress Plugin Vulnerability

On July 1st,2023, there was news that a “Vulnerability in WordPress plugin with 200,000+ active installations allows full site takeover with only “trivial” effort”.A CVE was also assigned to the vulnerability as CVE-2023–3460, with a CVSS v3.1 score of 9.8 (“critical”), As there was no publicly available exploit to use…

Pentesting

2 min read

Pentesting

2 min read


Jun 3

How CSRF bypass has helped me earn

Objective: Understanding Cross-Site Request Forgery (CSRF) and Its Implementation. Introduction: In today’s interconnected web landscape, security threats are a persistent concern for businesses and individuals. Cross-Site Request Forgery (CSRF) is one such vulnerability that poses a significant risk to web applications. …

Bug Bounty

3 min read

How CSRF bypass has helped me earn
How CSRF bypass has helped me earn
Bug Bounty

3 min read


Mar 15

Hacking IP Camera

RTSP is Known as Real-time Streaming Protocol and is supported by all IP cameras, network video recorders, hybrid video recorders, and many more modern high-definition digital video recorders. The protocol is similar to the HTTP protocol and commonly used for streaming media content. …

Hacking

1 min read

Hacking

1 min read


Feb 15

Demystifying CORS

CORS can only be completed by mentioning SOP or same-origin policy. So we should start with SOP before diving into CORS. What is SOP ??? The same-origin policy is a web browser security mechanism that aims to prevent websites from attacking each other. The same-origin policy restricts scripts on one…

Cors

4 min read

Demystifying CORS
Demystifying CORS
Cors

4 min read


Jan 31

Hacking Blind Xss

Sometimes, an attacker sends payloads to hack a system. Still, nothing is returned by the application, which can confirm that the application is insecure or hackable as the process he interacted with is Blind. If we simplify the hacking then, it usually means that an attacker will send some data…

Bug Bounty

2 min read

Bug Bounty

2 min read


Jan 16

Bait Open Wifi to hack into Mobile

Do you love open Wi-Fi? Wait before latching onto open Wi-Fi read this, I am your opinion would change. Hackers many a times leave the their Wi-Fi open to use it as a bait. When someone connects their device to their open Wi-Fi, our device’s MAC address and IP address…

Wifi

2 min read

Bait Open Wifi to hack into Mobile
Bait Open Wifi to hack into Mobile
Wifi

2 min read


Jan 5

Race Condition Vulnerabilities

Hello OutThere Today I am going to write about a specific vulnerability which I have found in some of the web applications that I have pentested in past The vulnerability is race condition . Description:-As per the OWASP testing guide, “A race condition is a flaw that produces an unexpected result when…

Bug Bounty

3 min read

Race Condition Vulnerabilities
Race Condition Vulnerabilities
Bug Bounty

3 min read

RoadToOSCP

RoadToOSCP

88 Followers

Security enthusiasts and avid python fan

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams