Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Emanuel Beni

Event Tracking integrity [migrated]

Posted on September 10, 2021 by Emanuel Beni

When we are trying to implement an ‘Event Tracking’ mechanism (recording/logging clicks, scrolls and other actions on the UI of the web application) on our web application.
Should ‘Event Tracking’ be tied to a session? I noticed that a lot… Continue reading Event Tracking integrity [migrated]→

Posted in logging, session management, tracking

Amazon AWS S3 Unrestricted File Upload

Posted on July 15, 2021 by Emanuel Beni

While I was pentesting a web application, I found out that files that are uploaded to the web application are stored in an AWS S3 instance. Based on my experience, when a web application needs to store all types of files, including files w… Continue reading Amazon AWS S3 Unrestricted File Upload→

Posted in Amazon, Amazon-S3, AWS, file-upload

HTTP Request Smuggling Checking for Desync Type

Posted on September 22, 2020 by Emanuel Beni

I am currently trying to learn HTTP Request Smuggling. In a presentation give by @defparam (https://www.youtube.com/watch?v=3tpnuzFLU8g), he mentioned that HTTP Request Smuggling/Desync can be classified into 3 categorization; Open Desync,… Continue reading HTTP Request Smuggling Checking for Desync Type→

Posted in HTTP, request-smuggling

HTTP Request Smuggling Checking for Desync Type

Posted on September 22, 2020 by Emanuel Beni

I am currently trying to learn HTTP Request Smuggling. In a presentation give by @defparam (https://www.youtube.com/watch?v=3tpnuzFLU8g), he mentioned that HTTP Request Smuggling/Desync can be classified into 3 categorization; Open Desync,… Continue reading HTTP Request Smuggling Checking for Desync Type→

Posted in HTTP, request-smuggling

HTTP Request Smuggling Basics

Posted on September 16, 2020 by Emanuel Beni

I am currently trying to learn HTTP Request Smuggling vulnerability to further enhance my pen testing skills. I have watched a couple of videos on Youtube and read articles online regarding it but still have a couple of questions in mind:
… Continue reading HTTP Request Smuggling Basics→

Posted in header, HTTP, request-smuggling

Self-XSS From File Upload Name

Posted on September 7, 2020 by Emanuel Beni

I encountered this type of vulnerability a couple of times but was not able to fully exploit it.
This vulnerability is a self-xss which is triggered from file names. E.g. If I were to upload a file named [xss-payload].png, it will be execu… Continue reading Self-XSS From File Upload Name→

Posted in self-xss, xss

SSRF Through Image Url

Posted on September 6, 2020 by Emanuel Beni

I am currently studying regarding SSRF. I noticed that an injection vector where SSRF might be present is always parameters that is related to url (Importing image using URL, others). I have encountered a couple of endpoints where request … Continue reading SSRF Through Image Url→

Posted in SSRF | Tagged Image

SQL Injection Doesn’t Sanitize But Doesn’t Execute Commands

Posted on August 24, 2020 by Emanuel Beni

I am currently doing a pentesting on a web application and focusing more on SQL Injection. This company I am pentesting have a functionality in which we are allowed to buy things from the vendors/suppliers registered there. When a product … Continue reading SQL Injection Doesn’t Sanitize But Doesn’t Execute Commands→

Posted in databases, SQL Injection

Unrestricted file upload in chat

Posted on August 11, 2020 by Emanuel Beni

I am currently doing a bug bounty program and found a possible file upload vulnerability, but I am not so sure about it.
The vulnerability is on the chat function. In the chat function, users are allowed to communicate with each other and … Continue reading Unrestricted file upload in chat→

Posted in file-upload, xss

Authorization Header (Bearer) Vulnerability

Posted on August 10, 2020 by Emanuel Beni

I’d like to brainstorm/ ask regarding a possible vulnerability that I encounter recently.
So recently, I was able to find an endpoint where generating an Authorization Token is possible for a user and no security is being implemented. No C… Continue reading Authorization Header (Bearer) Vulnerability→

Posted in Authorization, CSRF

Post navigation

← Older posts

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • NFC Record Player Promotes Intentional Listening May 17, 2026
  • ‘We Still Can’t See Dark Matter. But What If We Can Hear It?’ May 17, 2026
  • ASUS Zenbook A16 First Impressions May 17, 2026
  • US Math/Reading Scores Continue 13-Year Decline. Researchers Blame Reduced Testing and Social Media May 17, 2026
  • Us Math/Reading Scores Continue 13-Year Decline. Researchers Blame Reduced Testing and Social Media May 17, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up