Day 5. The 100-Day Bug Bounty Challenge: Understanding SQL Injection (Blind sqli)Welcome to Day 5 of my 100-day bug bounty challenge! Today, we’ll explore Blind SQL Injection (Blind SQLi), a stealthier form of SQL…Jan 17Jan 17
Day 4. The 100-Day Bug Bounty Challenge: Understanding SQL Injection Classic(In-band)Welcome to Day 4 of my 100-day bug bounty challenge! Today, we’ll discuss one of the most infamous and impactful vulnerabilities in web…Jan 141Jan 141
Day 3. The 100-Day Bug Bounty Challenge: Understanding DOM-Based XSS (Cross-Site Scripting)Welcome to Day 3 of my 100-day bug bounty challenge! Today, we’re diving into a more advanced form of XSS: DOM-Based Cross-Site Scripting…Jan 12Jan 12
Day 2. The 100-Day Bug Bounty Challenge: Understanding Stored XSS (Cross-Site Scripting)Welcome to Day 2 of my 100-day bug bounty challenge! Today, we’re exploring another powerful and dangerous vulnerability: Stored Cross-Site…Jan 10Jan 10
Day 1. The 100-Day Bug Bounty Challenge: Understanding Reflected XSS (Cross-Site Scripting)Welcome to Day 1 of my 100-day bug bounty challenge! Today, we’re diving into a common and impactful vulnerability in web applications…Jan 9Jan 9
Day 0. The 100-Day Bug Bounty Challenge: Sharing 100 Vulnerabilities in 100 DaysHi everyone! I’m Mahesh Dhakad, Cyber Security Researcher and a Part time bounty hunter, and today, I’m kicking off an exciting journey —…Jan 8Jan 8
What is CIA Triad?The CIA Triad is a set of three fundamental principles that guide the design and implementation of secure systems. These principles are:Oct 10, 2023Oct 10, 2023