Isuka sanuj

Isuka sanuj

Get RCE With SSTI Get RCE With SSTI

Yo yo miss me right? Guess what Im backšŸ„³šŸ„³So lets talk about SSTI or Server-side template injection As usually we need to works with things before jumping into SSTI. So lets try a template engine and learn what is it Lets use a Template engine A template engine is

Mar 29, 2024 4 mins

Getting RCE from web via ftp exploit Getting RCE from web via ftp exploit

Yo yo homies Iā€™m backĀ . yeah this post is in a different category than my other post(thatā€™s why my banner template changed) so first we need to talk about what is FTP and why are we using it What isĀ FTP The File Transfer Protocol is a

Mar 20, 2024 5 mins

Secrets of LFIšŸ¤« Secrets of LFIšŸ¤«

Yo yo homies Guess what? I lunched myĀ webĀ .ok so you can see my crackhead blog and portfolio :- so lets start Layout handling is crucial in web dev .But sometimes silly dev use to handle layout like this http://example.com/home.php?page=profile.php And as

Mar 12, 2024 5 mins

Era of hacking with AI Era of hacking with AI

So recently I went toĀ BugcrowdĀ and saw a report paper calledĀ Inside the Mind of a HackerĀ So when I read that newspaper, I remembered what was done these days.so Lets start. process of Generative ai So AI generates the response to our input as they were trained.

Mar 10, 2024 3 mins

Payload will after you Payload will after you

Yo homies Iā€™m back with another post.so lets start Before we dive into second order sql injection we need to talk about what is sql injecion What is Sql injection So Sql injection is attack that inject a malicious sql query to Application that can be execute SELECT

Mar 10, 2024 3 mins

Real time exploitation | Isuk4 Real time exploitation | Isuk4

Yo yo homies.im back with another post.so lets start Hmmm.Did you chat with live agents on any day? If you did that, you know that itā€™s a real time chat. like live agent can see youā€™re Mg in real time so how does developer make

Mar 10, 2024 2 mins

Art of the ROOT ā˜ ļøšŸ”’ Art of the ROOT ā˜ ļøšŸ”’

Hey Iā€™m back with another interesting topic.First of all did you notice anything new.yep a new cover its because this is out of web hacking.lets start first of all we need to talk about what is privilege escalation 01. What is privilege escalationā˜ ļø So you know

Mar 10, 2024 3 mins

Request can be malicious Request can be malicious

Heey after about week im back so lets start. so first this story begins with my homie sent me a web backend develop with express.js to fix a bugšŸ˜’so I fixed it but you know mešŸ˜‚after I fixed it I read the whole code.hmm there is

Mar 10, 2024 2 mins

Cross site scripting | Isuk4 Cross site scripting | Isuk4

So lets begin What is Cross site scripting if a website that directly renders user input it can be execute a html or js code thatā€™s what we called xss or cross site scripting. how it can be dangerous 1. Code Execution:Ā One of the primary dangers of XSS

Mar 10, 2024 4 mins

Secrets about Gadget chainsšŸ¤« Secrets about Gadget chainsšŸ¤«

Yo Yo Homies,Iā€™m back with another post so do you remember our last post we talked about Insecure deserializion and PHP object injection(yeah i know that POI is a type of Insecure ā€¦) so lets continue this What is serialization? simply serialization is a process of convert object

Mar 10, 2024 3 mins

Copyright Ā© Isuk4 . All Rights Reserved