Corona pandemic, code name: Covid-19 caused by the virus SARS-CoV-2 is this century’s first pandemic, and hopefully the last, has caused problems in almost every industry. There has been a paradigm shift on a massive scale. As the governments, shutdown their countries in order to fight with the crisis, all…
Assessing Web Application Firewalls (WAFs)
In the past few years I have done several web application firewall assessments and have been very successful in bypassing them. So, thought to share some of the things that I learnt. Let me just clarify what this post is NOT about: This post is not about, how to detect…
Don’t you dare to inject SQL !
Well, it’s just another post discussing sql injection but from defensive perspective. We all know how dangerous sql injection can be, so how do we prevent it from happening ? There are multiple ways:- 1- Whitelisting 2- Stored Procedure (Not So Safe which we will look into in another post)…
Prevent Command Injection In MVC .NET
Hi folks, i have recently started to look into vulnerabilities from development aspect and it’s quite interesting to write a vulnerable code and then fix it. In this post we are going to look at a simple command injection vulnerability and how to fix it. Before we start i would…
ZTE Home Gateway vdsl CPE admin control bypass
Hi Folks, There is a vulnerability in the ZTE home-router, installed in many homes (in millions) throughout the country, provided by Pakistan Telecommunication Company Limited (PTCL), which enables an attacker to bypass admin portal authentication and display and/or change the WIFI password. Furthermore, the attacker can reset the router to…
Huawei LTE router unauthenticated resource access
Disclaimer: [This POC is for Educational Purposes , I would Not be responsible for any misuse of the information mentioned in this blog post] Hi folks, Several vulnerabilities were identified in the Huawei LTE router. These are described in detail below: Product Family: LTE Model B315s – 22 Firmware version:…
TP-Link wireless router Archer C1200 – Cross-Site Scripting
Disclaimer: [This POC is for Educational Purposes , I would Not be responsible for any misuse of the information mentioned in this blog post] Hello folks. An Input validation vulnerability was found in TP-Link Archer c1200 v1.0, which results in client side code execution. [CVE-2018-13134] [+] Unauthenticated [+] Author: Usman…
TCP based covert channel (ChorTCP)
While researching on data exfiltration techniques and covert channels, I thought of making one of my own, dubbed ChorTCP. Though protocol over protocol tunneling is a well known concept but I really wanted to actually try to hypothesize one aspect and then implement it, just for fun. The abstract below…
The Art of Privacy – Part 3
This is the best part of the whole series, as in this part I will tell you, what to do to protect yourself from prying eyes, whether the prying eyes are of hackers, or oppressing regimes (This is such a relative term 🙂 ). It’s usually such a good feeling…
The Art of Privacy – Part 2
The biggest threat to privacy is the attitude of “AH, what would someone do with my email address, phone number or social security number”. Thanks to the awareness in security and security terminology becoming a fad and the names of attacks becoming more and more attractive, non-security savvy people are…