Understanding CL.0 and 0.CL Attacks: A Comparative Guide
A guide to understanding and differentiating between CL.0 and 0.CL Request Smuggling vulnerabilities, with a practical analysis of testing methodologies.
A guide to understanding and differentiating between CL.0 and 0.CL Request Smuggling vulnerabilities, with a practical analysis of testing methodologies.
This article guides you through configuring IntelliJ to start a debugging session with Burp Suite seamlessly at the click of a button. Streamline your workflow and enhance your ability to test Burp...
Refactoring a single-file Python project, like the Burp Upload Scanner, into a modular structure using the MVC pattern enhances collaboration and maintainability. This blog post details the process...
In this HackTheBox walkthrough of the *Boardlight* machine, we explore enumeration techniques, vulnerability exploitation, and privilege escalation to gain root access. By identifying key VHosts, l...
With Firewall Ferret, security testers can now have greater control and precision when testing WAFs, manually adding junk data to requests and expanding Burp Suite’s active scan checks.
Learn how to write JUnit tests for Burp Suite extensions, avoid common pitfalls, and optimize your development workflow.
In this post, I share a Python script that leverages the POC from **CVE-2022-46169** to create a pseudo shell for pentesting, developed as part of a HackTheBox machine challenge. The script automat...
I contributed to a WebSocket Pentesting tool that was sponsored by Doyensec on GitHub.
I wrote a Bash script that helps set up a pentesting environment on Linux systems that use the apt package manager. This script sets up bash aliases that I like to use and downloads common testing ...
This post provides a walkthrough of the HackTheBox machine MonitorsTwo, including enumeration, exploiting CVE-2022-46169 for RCE, and gaining root.