InfoSafeHub Profile Banner
InfoSafeHub Profile
InfoSafeHub

@InfoSafeHub

Followers
8
Following
1
Media
7
Statuses
66

#NovaExperience

Joined February 2022
Don't wanna be here? Send us removal request.
@InfoSafeHub
InfoSafeHub
2 years
8- File Upload Vulnerabilities From Basic To Advanced. 9- Business Logic Vulnerabilities Basic To Advanced. 10- Gaining Access Through Server-Side Request Forgery. don't forget to follow :).
0
0
0
@InfoSafeHub
InfoSafeHub
2 years
5- Information Disclosure Vulnerabilities. 6- Access Control Vulnerabilities And Privilege Escalation. 7- XML External Entity Injection | XXE Injection.
0
0
0
@InfoSafeHub
InfoSafeHub
2 years
1- Unleashing The Power Of SQL Injection . 2- What Is Authentication Vulnerabilities. 3- Exploring Directory Traversal Vulnerability. 4- OS Command Injection.
0
0
0
@InfoSafeHub
InfoSafeHub
2 years
We have explored each vulnerability from beginner to advanced levels, and we have provided practical labs with step-by-step solutions to gain hands-on experience. Here is the link to our roadmap:
3
0
0
@InfoSafeHub
InfoSafeHub
2 years
Do you want to master server-side vulnerabilities in web security, but you're not sure where to start? You can easily master server-side vulnerabilities by following our carefully crafted roadmap. A THREAD 🧵.#cybersecurity #ethicalhacking #sqlinjection #websecurity
Tweet media one
1
0
0
@InfoSafeHub
InfoSafeHub
2 years
. Once the learning path is ready, I will update all of you. Thank you for giving your valuable time. #cybersecurity #cybersecuritytips #ethicalhacking #bugbounty #bugbountytips.
0
0
0
@InfoSafeHub
InfoSafeHub
2 years
Right now, I am working on client-side attacks, which will cover Cross-site scripting (XSS), Cross-site request forgery (CSRF), Cross-origin resource sharing (CORS), Clickjacking, DOM-based vulnerabilities, WebSockets, and more. You can learn everything from our official website.
1
0
0
@InfoSafeHub
InfoSafeHub
2 years
server-side request forgery, XML, and XXE injection vulnerabilities. These articles are written in a step-by-step manner. I am currently creating a learning path for beginners so that they can easily access the necessary resources and learn from them.
1
0
0
@InfoSafeHub
InfoSafeHub
2 years
I have almost covered server-side topics and have written over 100 articles on server-side attacks, including SQL injection, authentication, directory traversal, command injection, business logic vulnerabilities, information disclosure, access control, file upload vulnerabilities.
1
0
0
@InfoSafeHub
InfoSafeHub
2 years
Hello friends, my name is Masaud Ahmad, and recently I started working on server-side vulnerabilities. When I covered web application pentesting, thought of sharing this knowledge with others and improving my own learning as well. (THREADS🧵).My LinkedIn:
pk.linkedin.com
Hi, I’m Masaud Ahmad, a seasoned Offensive Security Specialist and Penetration Tester with a relentless passion for securing digital landscapes. My expertise lies in uncovering vulnerabilities in web...
1
1
0
@InfoSafeHub
InfoSafeHub
2 years
Blind SQL injection with out-of-band interaction. Blind SQL injection with out-of-band data exfiltration. SQL injection with filter bypass via XML encoding.
0
0
0
@InfoSafeHub
InfoSafeHub
2 years
SQL injection attack, listing the database contents on non-Oracle databases. SQL injection attack, listing the database contents on Oracle. Blind SQL injection with time delays.
1
0
0
@InfoSafeHub
InfoSafeHub
2 years
SQL injection attack, querying the database type and version on Oracle. SQL injection attack, querying the database type and version on MySQL and Microsoft.
1
0
0
@InfoSafeHub
InfoSafeHub
2 years
SQL injection UNION attack, retrieving data from other tables. SQL injection UNION attack, retrieving multiple values in a single column.
1
0
0
@InfoSafeHub
InfoSafeHub
2 years
SQL injection UNION attack, determining the number of columns returned by the query. SQL injection UNION attack, finding a column containing text.
1
0
0
@InfoSafeHub
InfoSafeHub
2 years
SQL injection vulnerability in WHERE clause allowing retrieval of hidden data. SQL injection vulnerability allowing login bypass.
1
0
0
@InfoSafeHub
InfoSafeHub
2 years
and yes, that series is almost complete now. In this series, I have covered SQL injection from basic to advanced. By reading and practicing these articles, you will be able to cover SQL injection from a basic to an advanced level. Unleashing the Power of SQL Injection:-.
1
0
0
@InfoSafeHub
InfoSafeHub
2 years
The Story of an SQL Injection: Exposing the Dangers of Database Vulnerabilities. Just as I had mentioned before, I am writing a series on SQL injection,.(Check THREAD) 🧵.#cybersecurity #cybersecuritytips #ethicalhacking #sqlinjection #sqli #bugbounty #bugbountytips
Tweet media one
2
1
2
@InfoSafeHub
InfoSafeHub
2 years
13. Referer-based access control.
0
0
1
@InfoSafeHub
InfoSafeHub
2 years
10. URL-based access control can be circumvented. 11. Method-based access control can be circumvented. 12. Multi-step process with no access control on one step.
1
0
1