COMPUTER KORNER
Tuesday, August 31, 2021
Best Practices For Mobile Device Testing
›
Photo by freestocks on Unsplash Mobile testing is done to confirm that all of its features, including its hardware and other software comp...
Thursday, August 2, 2018
Open Redirection in Oauth
›
Hi there, I am fond of testing API. Whenever a bug bounty program launches their program first of all I look if they have an API or not....
Monday, July 30, 2018
Insufficient Transport Layer Protection: Mediafire Android Application
›
Hi there, It was a quite long time since I published my last post sorry for keep you waiting. So this is a story of a bug which I fou...
Monday, March 12, 2018
Bypassing Private Profile Restrictions
›
So this post is about bypassing the private profile Restrictions on a private program on HackerOne. I will not disclose the program name ...
Monday, February 27, 2017
Bug Bounty: Bypassing Account Suspension In order to get full access to account[Mediafire]
›
Hi there, In this post I am going to discuss about a bug which I found on Mediafire. I noticed that Mediafire have a bug bounty...
1 comment:
Tuesday, January 31, 2017
Website Sends the Actual Password on the Mobile Number: Considered as the Severe Vulnerability or Not ?
›
Hi there, I was just looking at some website which provides free SMS sending service. There are a lot of website which provides this fu...
Saturday, December 3, 2016
Bug Bounty: Vulnerability In customer.io
›
Hi there, First of all sorry for this long pause from my side I was busy in somethings and it took me some time to sort out all t...
Friday, August 12, 2016
Wi-Fi Hacking: Deauthentication Attack
›
Hi there, So this post is about deauthentication attack. So we can do a deauthentication attack without connecting to a target network....
1 comment:
›
Home
View web version