Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Utkarsh Agrawal

Bypass this unique XSS filter?

Posted on July 3, 2018 by Utkarsh Agrawal

I found a website that reflected back the user inputs. But the problem is when I inject this payload <svg/onload=alert(1)> I get an error.

But when I use this payload <%20svg/onload=alert(1)>, my input reflects b… Continue reading Bypass this unique XSS filter?→

Posted in reflected-xss, xss

Meterpreter shell and system shell define?

Posted on June 30, 2018 by Utkarsh Agrawal

What is the difference between Meterpreter shell and system shell?

For example, if I found some vulnerability in a system which allowed both shells, then what should I go for, system shell or Meterpreter shell?

What kind of… Continue reading Meterpreter shell and system shell define?→

Posted in Metasploit, meterpreter, network

How does Client-Side-Exploitation get the System-level-shell in Metasploit?

Posted on June 28, 2018 by Utkarsh Agrawal

Forex. if my client using the vulnerable Internet Explorer which was vulnerable to the Aurora Vulnerability (I know its old and patch, but for now, let’s assume) then I use Metasploit Client-side exploitation payload.

Steps … Continue reading How does Client-Side-Exploitation get the System-level-shell in Metasploit?→

Posted in Metasploit, network, penetration-test

Why should not run Metasploitable on bridge network?

Posted on June 26, 2018 by Utkarsh Agrawal

I have read on somewhere that:

“Do not run Metasploitable (an Intended Vulnerable Virtual Machine)
in your Bridge Network.”

Why? Does it create a bridge to the attacker’s system directly? If yes, how does this happen?

… Continue reading Why should not run Metasploitable on bridge network?→

Posted in metasploitable, network, Virtualization

How FTP can be connect under SSH so it become sftp? [duplicate]

Posted on June 21, 2018 by Utkarsh Agrawal

I have seen this answer and it just tells the difference between SFTP and VPN ftp.

But I am asking for How exactly SFTP works? The first SSH make a secure tunnel but then how do I use FTP?

Continue reading How FTP can be connect under SSH so it become sftp? [duplicate]→

Posted in FTP, ssh

How Symmetric key Occurs in SSH?

Posted on June 4, 2018 by Utkarsh Agrawal

How Symmetric Key occurs in SSH process?

As I think that the Asymmetric key used for the only Authentication but my main problem is “How Server generates the Symmetric Key which will use to do secure communication”?

Continue reading How Symmetric key Occurs in SSH?→

Posted in asymmetric, ssh

Is it possible to Subdomain Take Over with Cloudfare?

Posted on April 22, 2018 by Utkarsh Agrawal

Suppose the CNAME of www.anydomain.com is pointing to the www.anydomain.com.cdn.cloudflare.net. Can an attacker try to exploit the Subdomain Take over?

Continue reading Is it possible to Subdomain Take Over with Cloudfare?→

Posted in cdn, cloudflare, sub-domain, Vulnerability

What Can Blackhat groups can do with the Iframe tag?

Posted on April 7, 2018 by Utkarsh Agrawal

I am trying to learn “How Blackhat groups exploit the Victim with the Clickjacking?”.

Let’s say, http://januapp.com/demo/useredit.php is vulnerable to the clickjacking.

The code is something like that,

<html>
&l… Continue reading What Can Blackhat groups can do with the Iframe tag?→

Posted in clickjacking

XSS on an input element with style="display: none"

Posted on April 2, 2018 by Utkarsh Agrawal

Suppose only user-supplied double quotes are allowed in an input tag which has the style attribute set to display: none.

Something like this:

<input type=”text” style=”display: none;” value=”aa” autofocus/onfocus=”prompt… Continue reading XSS on an input element with style="display: none"→

Posted in javascript, xss

How can SSRF be more dangerous? [on hold]

Posted on March 10, 2018 by Utkarsh Agrawal

How can SSRF be more dangerous? I know through SSRF we can do port scanning But only port Scanning?

Are we able to read the local files? And if we can’t read the local files what further can we do with it?

Continue reading How can SSRF be more dangerous? [on hold]→

Posted in SSRF, Vulnerability

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Cursor AI Vulnerability Exposed Developer Devices April 17, 2026
  • Intel’s New Core Series 3 Is Its Answer To the MacBook Neo April 17, 2026
  • 53 DDoS Domains Taken Down by Law Enforcement April 17, 2026
  • Android 17 Beta 4 arrives with post-quantum cryptography and new memory limits April 17, 2026
  • Apple AirTag tracking can be misled by replayed Bluetooth signals April 17, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up