Harsh BothraThe Power of Reporting: How to write effective reportsThe bulwark of our digital ecosystem, Penetration Testing (pentesting), has the arduous task of staving off numerous cyber threats. An…Aug 6, 20231Aug 6, 20231
Harsh BothraLearn365 Challenge Review & Year 2021 in a NutshellLearning is an essential factor irrespective of your domain, level of expertise and experience. It helps one to constantly improve their…Dec 22, 20211Dec 22, 20211
Harsh BothraAttacking Social Logins: Pre-Authentication Account TakeoverAuthentication is one of the most crucial aspects when it comes to the security of an application. However, suppose an attacker can bypass…Jun 11, 20211Jun 11, 20211
Harsh BothraHow do I get Started in Cyber Security? — My Perspective & Learning Path!Cyber Security, Ethical Hacking, Application Security, Penetration Testing, Bug Bounties, etc., these career options are blooming and…Mar 6, 202123Mar 6, 202123
Harsh BothraGot Cookies? Cookie Based Authentication Vulnerabilities in WildCookies are a widely used way to enable authentication in the majority of applications. Over time, there has been a lot of security…Mar 2, 2021Mar 2, 2021
Harsh BothrainInfoSec Write-upseWPTXv2 Exam ReviewWeb Application is commonly found part of any organization’s infrastructure and often is exposed publicly and accessible by the world. Due…Feb 16, 20213Feb 16, 20213
Harsh BothraScope Based Recon: Smart Recon TacticsReconnaissance a.k.a. Recon is an essential process, especially when dealing with Black Box Penetration Testing where you have no…Feb 16, 2021Feb 16, 2021
Harsh BothraBypassing the Protections — MFA Bypass Techniques for the WinMulti-Factor Authentication (MFA) often known as Two-Factor Authentication (2FA) is an added layer of protection added to an application…Jan 27, 20211Jan 27, 20211
Harsh BothrainInfoSec Write-upseCPPTv2 Exam ReviewThe penetration Testing domain has grown exponentially in the last couple of years and so the competition. Validating and Proving your…Jan 12, 20212Jan 12, 20212
Harsh BothrainInfoSec Write-upsEvading Filters to perform the Arbitrary URL Redirection AttackArbitrary URL Redirection Attack often is popularly known as an Open Redirection attack, which is a common web vulnerability that allows…Nov 12, 20202Nov 12, 20202