omar8050 Profile Banner
nordazepam Profile
nordazepam

@omar8050

Followers
3
Following
50
Media
3
Statuses
50

Joined November 2024
Don't wanna be here? Send us removal request.
@omar8050
nordazepam
4 months
I completed the Web Security Academy lab:.CSRF where token is not tied to user session.this lab have a god ida : thank you @WebSecAcademy .@WebSecAcademy.
Tweet card summary image
portswigger.net
This lab's email change functionality is vulnerable to CSRF. It uses tokens to try to prevent CSRF attacks, but they aren't integrated into the site's ...
0
0
0
@omar8050
nordazepam
4 months
I completed the Web Security Academy lab:.CSRF where token validation depends on token being present.This lab easy to solve it : .just chnge email and intersept the request .then click right and genirate CSRF-POC .set in exploit server don.@WebSecAcademy.
Tweet card summary image
portswigger.net
This lab's email change functionality is vulnerable to CSRF. To solve the lab, use your exploit server to host an HTML page that uses a CSRF attack to ...
0
0
1
@omar8050
nordazepam
5 months
Tweet media one
0
0
0
@omar8050
nordazepam
5 months
Tweet media one
0
0
0
@omar8050
nordazepam
5 months
I completed the Web Security Academy lab:.Web cache poisoning with an unkeyed cookie. @WebSecAcademy. .set the payload in the fehost= : "-alert-".
portswigger.net
This lab is vulnerable to web cache poisoning because cookies aren't included in the cache key. An unsuspecting user regularly visits the site's home page. ...
1
0
0
@omar8050
nordazepam
5 months
4️⃣ set in the header : X-Forwarded-Host: link_exploit_server.
0
0
0
@omar8050
nordazepam
5 months
I completed the Web Security Academy lab:.Web cache poisoning with an unkeyed header. @WebSecAcademy. . 1️⃣go to expoit server .2️⃣ set this payload : alert(document.cookie).3️⃣ reload page and intersept the request in burp .down etc. .
Tweet card summary image
portswigger.net
This lab is vulnerable to web cache poisoning because it handles input from an unkeyed header in an unsafe way. An unsuspecting user regularly visits the ...
1
0
0
@omar8050
nordazepam
5 months
1️⃣ go to page login and send request burp.2️⃣ interspet the request and Modfay JWT tokne to admin ans Path "/admin".
0
0
0
@omar8050
nordazepam
5 months
who am i : my name is omar and i'm bug bounty trainer .Lab: Excessive trust in client-side controls .How to found vuln : .Step 1 : click in the product <Lightweight "l33t" Leather Jacket >.Step 2 : Step 2 intercept the requests in burp .Step 3 : change the price in number 1.
0
0
1
@omar8050
nordazepam
5 months
Tweet media one
0
0
1
@omar8050
nordazepam
5 months
step 1 : click a product.step 2 : click "Check stock" and intercept the request burp .step 3 : change the url "StockAPI" in the payload :. http:%2f%2flocalhost/admin/delete?username=carlos.
0
0
0
@omar8050
nordazepam
9 months
I completed the Web Security Academy lab:.SQL injection vulnerability allowing login bypass. @WebSecAcademy. . username = admin .password = ' or 1=1--.
Tweet card summary image
portswigger.net
This lab contains a SQL injection vulnerability in the login function. To solve the lab, perform a SQL injection attack that logs in to the application as ...
0
0
2
@omar8050
nordazepam
9 months
I completed the Web Security Academy lab:.Reflected XSS protected by CSP, with CSP bypass. @WebSecAcademy. .Don is the Expert Lab 🥶.
Tweet card summary image
portswigger.net
This lab uses CSP and contains a reflected XSS vulnerability. To solve the lab, perform a cross-site scripting attack that bypasses the CSP and calls the ...
0
0
3