• Home
  • About
  • Contact
  • Dribbble
  • Facebook
  • Pinterest
  • Behance
  • Instagram

Application Snooping

A knowledge sharing platform for Web App security and Malware reversing

  • Home
  • Articles
    • Hacking
    • Application Security
    • Forensics
    • General Security
    • Reverse Engineering
  • Tutorials
    • PHP
    • Ajax
    • Jquery
    • CSS
    • Javascript
  • Poc Writeups
  • CTF-Writeups
  • Download
USB FORENSICS

USB FORENSICS

Rakesh Friday, July 27, 2018 Add Comment Edit
These days while sitting idle I thought to look into the SPSE course's exercises,and Thought to present my customized solution to the ...
How Sarahah is  playing with your privacy?

How Sarahah is playing with your privacy?

Rakesh Monday, August 28, 2017 Add Comment Edit
These days Sarahah is one of the most common app which is being used by us. So following the trend I also thought to install the same ...
Break into Billu Box

Break into Billu Box

Rakesh Tuesday, August 15, 2017 Add Comment Edit
Hello All Once again I am back with one more walk through of   a new vulnerable lab challenge “Billu Box” .Where   attacker need to ...
PHP Include And Post Exploitation:Walkthrough

PHP Include And Post Exploitation:Walkthrough

Rakesh Sunday, December 18, 2016 Add Comment Edit
This challange is all about escalating the Local file inclusion vulnerabilty f or gaining the  shell in the box. so  lets jump into the t...
Pages 1 of 3 123Next
Subscribe to: Posts ( Atom )

Popular Posts

  • Sqli to Shell Walkthrough
    This write-up   explains how one can, go from a SQL injection to shell &  gain access to the administration console. one can d...
  • From SQL Injection to Shell 2:Walkthough
    I found this challange really interesting & challenging something which is quite  close to the practical web app security that we witne...
  • PHP Include And Post Exploitation:Walkthrough
    This challange is all about escalating the Local file inclusion vulnerabilty f or gaining the  shell in the box. so  lets jump into the t...
  • How can an attacker dump all private video hosted on vimeo
    Recent Studies of data breach will give us an idea how weak  passwords policies/Missing rate-limiting in sensitive details  are one of th...
  • KNOW HOW:PHP
    I have divided the  PHP in following topics which I will be explaining while keeping the security lapses noticed in web application based on...
  • USB FORENSICS
    These days while sitting idle I thought to look into the SPSE course's exercises,and Thought to present my customized solution to the ...
  • How Sarahah is playing with your privacy?
    These days Sarahah is one of the most common app which is being used by us. So following the trend I also thought to install the same ...
  • Session ID and its Predictablilty :Authentication Bypass
    Session ID The stateless nature of HTTP requires a  solution for uniquely tracking a visitor on a web-base application. Various meth...
  • How I hacked into their private server?
    Hey Guys , Today I Am Going To Explain A Cool hack From My One Of My Findings recently.Firstly I Was Surfing  the site (site name not disc...
  • practical example of host header injection
    Let me introduce one of my old finding today before you all.This particular bug was discovered in one of  the private site for which i work...

Video Of Day

Labels

  • BUG_BOUNTY_POC
  • CTF
  • General security
  • PHP
  • Python code
  • Tits & bits

Twitterati

Tweets by zerodayguys

Thanks-Visitors

Find Us On Facebook

About Me

Rakesh
View my complete profile
Rakesh Singh:. Powered by Blogger.

Blog Archive

Total Pageviews

Search This Blog

Gallery

Follow us on FaceBook

About

Popular Posts

  • Sqli to Shell Walkthrough
    This write-up   explains how one can, go from a SQL injection to shell &  gain access to the administration console. one can d...
  • From SQL Injection to Shell 2:Walkthough
    I found this challange really interesting & challenging something which is quite  close to the practical web app security that we witne...
  • PHP Include And Post Exploitation:Walkthrough
    This challange is all about escalating the Local file inclusion vulnerabilty f or gaining the  shell in the box. so  lets jump into the t...
  • How can an attacker dump all private video hosted on vimeo
    Recent Studies of data breach will give us an idea how weak  passwords policies/Missing rate-limiting in sensitive details  are one of th...
  • KNOW HOW:PHP
    I have divided the  PHP in following topics which I will be explaining while keeping the security lapses noticed in web application based on...
  • USB FORENSICS
    These days while sitting idle I thought to look into the SPSE course's exercises,and Thought to present my customized solution to the ...
  • How Sarahah is playing with your privacy?
    These days Sarahah is one of the most common app which is being used by us. So following the trend I also thought to install the same ...
  • Session ID and its Predictablilty :Authentication Bypass
    Session ID The stateless nature of HTTP requires a  solution for uniquely tracking a visitor on a web-base application. Various meth...
  • How I hacked into their private server?
    Hey Guys , Today I Am Going To Explain A Cool hack From My One Of My Findings recently.Firstly I Was Surfing  the site (site name not disc...
  • practical example of host header injection
    Let me introduce one of my old finding today before you all.This particular bug was discovered in one of  the private site for which i work...
  • Home
  • About
  • Contact

Copyright © 2014 Application Snooping / Template Created By : ThemeXpose
  • Image
  • Image
  • Image
  • Image
  • Image