Skip to content

Jitendra Patro

It's only "not easy" until you learn how.

Menu
  • Home
  • Blog
  • Projects
  • Writeups
    • Advisories
      • CVE writeups
      • Not CVE writeups
    • Android
    • Radio/Satellite Hacks
    • Secure Code Warrior
      • PHP Basic
    • HW Hacks

Tag: code

Posted onJune 5, 2023June 7, 2023Android

OWASP Android UnCrackable Level 2

by PhoenixLeave a comment on OWASP Android UnCrackable Level 2

This is my second blog post related to Android Security. I recommend reading my first blog post in this category to understand some of the concepts I’m going to use…

Read More
Posted onMay 24, 2023June 5, 2023Android

OWASP Android UnCrackable Level 1

by PhoenixLeave a comment on OWASP Android UnCrackable Level 1

This is my first blog post related to Android Security. Today, I’ll be writing about two different solutions to solve the OWASP Uncrackable Level 1 Android app. For the first…

Read More
Posted onMarch 8, 2023April 1, 2023HW Hacks

Emulating AARCH64(ARM64) with QEMU – Part 1

by Phoenix2 Comments on Emulating AARCH64(ARM64) with QEMU – Part 1

Introduction Whether you’re trying to build/test software for different architectures, or doing reverse engineering/hardware hacking, you’ll often come across the need to possess a build/hacking environment for a different architecture…

Read More
Posted onJanuary 20, 2023April 6, 2023ModSecurity

ModSecurity with OWASP CRS – Part 1: Installation

by PhoenixLeave a comment on ModSecurity with OWASP CRS – Part 1: Installation

ModSecurity is an open source, cross platform Web Application Firewall (WAF) developed by Trustwave’s SpiderLabs. It has a robust event-based programming language which provides protection from a range of attacks…

Read More
Posted onJuly 30, 2022January 3, 2023Advisories

CVE-2022-33994:- Stored XSS in WordPress

by PhoenixLeave a comment on CVE-2022-33994:- Stored XSS in WordPress

Introduction I found a Stored Cross Site Scripting vulnerability in WordPress that got rejected and got labeled as Informative by the WordPress Team. Today is the 45th day since I…

Read More
Posted onJuly 4, 2022March 12, 2023Advisories

Multiple Vulnerabilities in Idno – Known PHP CMS software

by Phoenix4 Comments on Multiple Vulnerabilities in Idno – Known PHP CMS software

Introduction My journey into Source code security auditing started back in October 2021, when I was creating an intentionally vulnerable Linux machine for online hacking. I had to audit and…

Read More
Posted onJune 27, 2022May 11, 2023Tutorials

Deploying a Shadowsocks Server to GCP using Terraform

by PhoenixLeave a comment on Deploying a Shadowsocks Server to GCP using Terraform

Introduction Terraform is the most popular Infrastructure as code (IaC) tool available in the market. It supports more than a 1000 cloud providers and has some serious documentation for getting…

Read More
Posted onApril 20, 2022November 2, 2022PHP Basic

OWASP A10:2017 – Insufficient Logging & Monitoring

by PhoenixLeave a comment on OWASP A10:2017 – Insufficient Logging & Monitoring

If you stumble across this post and are wondering what this is all about, then I recommend reading this post before following this guide. TL; DR, this post is about solving Secure Code…

Read More
Posted onApril 18, 2022November 2, 2022PHP Basic

OWASP A9:2017 – Using Components with Known Vulnerabilities

by PhoenixLeave a comment on OWASP A9:2017 – Using Components with Known Vulnerabilities

If you stumble across this post and are wondering what this is all about, then I recommend reading this post before following this guide. TL; DR, this post is about solving Secure Code…

Read More
Posted onApril 16, 2022November 2, 2022PHP Basic

OWASP A7:2017 – Cross-Site Scripting (XSS)

by PhoenixLeave a comment on OWASP A7:2017 – Cross-Site Scripting (XSS)

If you stumble across this post and are wondering what this is all about, then I recommend reading this post before following this guide. TL; DR, this post is about solving Secure Code…

Read More

Posts pagination

Page 1 Page 2 Page 3 Next Page

About The Blog

I created this blog to share the knowledge I've gained over the years and things that I'm yet to learn. Presently, my posts will be mainly focused on Open Source software, Information Security and Hacking. Happy Learning!

Recent Posts

  • OWASP Android UnCrackable Level 2
  • OWASP Android UnCrackable Level 1
  • Project: Wireless Hacks!
  • Emulating AARCH64(ARM64) with QEMU – Part 1
  • ModSecurity with OWASP CRS – Part 1: Installation
  • CVE-2022-33012:- Account Takeover Through Password Reset Poisoning
  • CVE-2022-33994:- Stored XSS in WordPress

Archives

  • 2023
  • 2022
  • 2021

Categories

  • Advisories
  • Android
  • CVE writeups
  • HW Hacks
  • ModSecurity
  • Not CVE writeups
  • PHP Basic
  • Projects
  • Radio/Satellite Hacks
  • Secure Code Warrior
  • Tutorials
  • Writeups

Tags

aarch64 access control Account Takeover algorithm Android apache Azure Bitwarden C CMS code Core Rule Set CVE Debian dns docker Email emulation first post Frida gcloud cli git Google Cloud HCL HTTP Headers IDOR injection installing-openvpn-as iptables Java JavaScript Linode Linux mail MFA Microsxxt MITRE MobSF mysql Networking nextcloud Open Source openvpn OpenVPN 3 ovpn-dco OWASP pagespeed password manager path traversal performance php php-fpm postfix Project proxy QEMU Radio restricting-ssh rootless docker securing-ssh Security security misconfig sensitive data exposure Shadowsocks SMIL sql ssh ssl sslh sslh-proxy su sudo SVG Terraform transparent-sslh two-factor-auth ubuntu virtualization vulnerability WAF webserver WordPress XSS

Contact Me

  • GitHub
  • LinkedIn
  • Mail
  • GitHub
© 2024 Jitendra Patro.