Web/TechReview Inon Shkedy's "31-days-of-pentesting" – TIPs [11/31] Abusing Grafana/Kibana Filters to Access Other Users’ Data
Web/TechReview Inon Shkedy's "31-days-of-pentesting" – TIPs [10/31] Pivoting from XXE: DoS, LFI and SSRF in One Bug
Web/TechReview Inon Shkedy's "31-days-of-pentesting" – TIPs [9/31]XXE to RCE: Gopher-Based SSRF Against Java Debuggers
Web/TechReview Inon Shkedy's "31-days-of-pentesting" – TIPs [8/31] White-box Pentst? Learn the dangerous functions of the tested language.
Web/TechReview Inon Shkedy's "31-days-of-pentesting" – TIPs [7/31] SQLi to SSRF: Triggering HTTP Requests from the Database
Web/TechReview Inon Shkedy's "31-days-of-pentesting" – TIPs [6/31] SQLi to RCE [2/2]: Abusing Custom Stored Procedures
Web/TechReview Inon Shkedy's "31-days-of-pentesting" – TIPs [5/31] Turning SQL Injection into RCE via File/URL-Based Jobs
Web/TechReview Inon Shkedy's "31-days-of-pentesting" – TIPs [4/31] From File Upload to RCE: Finding the Real Execution Paths