Open in app

Sign In

Write

Sign In

Akshansh JaisWal
Akshansh JaisWal

66 Followers

Home

About

Feb 1, 2022

H1-CTF Hacky Holidays Writeup

Hey everyone i hope you all are fine and doing good, In December Hackerone made a 12 day 12 level CTF called Hacky-Holidays which had 12 flags. I was able to complete the CTF and get all the 12 flags and here i’m adding the writeup for the same.Apologies …

Bug Bounty

11 min read

H1-CTF Hacky Holidays Writeup
H1-CTF Hacky Holidays Writeup
Bug Bounty

11 min read


Nov 10, 2020

BugPoC XSS CTF CHALLENGE!

Hey everyone I recently solved the BugPoc XSS challenge and it was an awesome learning opportunity through a series of challenges, through the writeup I would divide the challenge into 3 parts and I will try to explain each part as easy as possible so let's begin: Bypassing the Iframe…

Xss

6 min read

BugPoC XSS CTF CHALLENGE!
BugPoC XSS CTF CHALLENGE!
Xss

6 min read


Aug 31, 2020

[UPDATED]Vuldroid App Walkthrough

Hi everyone I hope that you all are well and good, recently I have been learning about security bugs that arise in Android apps from the static code level while learning the concepts I created a Vuldroid which is a vulnerable app that consists of the following Vulnerabilities: Steal Password…

Bug Bounty

7 min read

Vuldroid App Walkthrough
Vuldroid App Walkthrough
Bug Bounty

7 min read


Jul 28, 2020

Pre-Access to Victim’s Account via Facebook Signup

Hey, everyone, I hope you are doing fine. Around a few months back I have found this issue. This is a case of pre account takeover in case a user has no account on the website and the attacker creates an account before the victim so in my case when…

Bug Bounty

4 min read

Pre-Access to Victim’s Account via Facebook Signup
Pre-Access to Victim’s Account via Facebook Signup
Bug Bounty

4 min read


Aug 23, 2019

Command Injection In Online Compiler

Hi everyone i hope you all are doing great , I wanted to share about a vulnerability in IDE’s which leads to command injection. Now most IDE’s run on the virtual environment therefore even these kinds of vulnerabilities are not directly affecting them unless you can execute root commands. Now…

Terminal

2 min read

Command Injection In Online Compiler
Command Injection In Online Compiler
Terminal

2 min read

Akshansh JaisWal

Akshansh JaisWal

66 Followers

Security is Fun

Following
  • Rohit kumar

    Rohit kumar

  • Bhavesh Thakur

    Bhavesh Thakur

  • Danang Tri Atmaja

    Danang Tri Atmaja

  • Alyssa Herrera

    Alyssa Herrera

  • Uranium238s

    Uranium238s

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech