The Malicious Maneuvers of Host Header Injection: Exploiting Vulnerabilities and Bypassing SecurityAs discussed in the previous blog I am writing about the impacts of Host Header Injection (HHI) attacks.Mar 14Mar 14
Host Header Injection: The Sneaky Web ThreatImagine you’re browsing your favorite online store, eager to snag that perfect pair of sneakers. The familiar logo, the intuitive interface…Jan 31Jan 31
HTTP/3: The Next Generation of Web PerformanceHTTP/3 is the next major version of the Hypertext Transfer Protocol (HTTP), the protocol that underpins the web. It is based on the QUIC…Oct 1, 2023Oct 1, 2023
Understanding HTTP/2: Improving Web Performance with Prioritization and MultiplexingSince the invention of the World Wide Web, HTTP (Hypertext Transfer Protocol) has been the foundation of web communication. The protocol…May 3, 2023May 3, 2023
Hack The Box — Tenet — Write upTenet is a Medium difficulty machine that features an Apache web server. It contains a Wordpress blog with a few posts. One of the…Jun 14, 2021Jun 14, 2021
Hack The Box — Script Kiddie — Write upScriptKiddie is an easy difficulty Linux machine that presents a Metasploit vulnerability (CVE-2020–7384), along with classic attacks such…Jun 10, 2021Jun 10, 2021
Hack The Box — Time — Write UpTime is a medium difficulty Linux machine that features an online JSON parser web application. This application is found to suffer from a…Apr 15, 2021Apr 15, 2021