Harsh BothraThe Power of Reporting: How to write effective reportsThe bulwark of our digital ecosystem, Penetration Testing (pentesting), has the arduous task of staving off numerous cyber threats. An…6 min read·Aug 6, 2023--1--1
Harsh BothraLearn365 Challenge Review & Year 2021 in a NutshellLearning is an essential factor irrespective of your domain, level of expertise and experience. It helps one to constantly improve their…4 min read·Dec 22, 2021--1--1
Harsh BothraAttacking Social Logins: Pre-Authentication Account TakeoverAuthentication is one of the most crucial aspects when it comes to the security of an application. However, suppose an attacker can bypass…4 min read·Jun 11, 2021--1--1
Harsh BothraHow do I get Started in Cyber Security? — My Perspective & Learning Path!Cyber Security, Ethical Hacking, Application Security, Penetration Testing, Bug Bounties, etc., these career options are blooming and…11 min read·Mar 6, 2021--23--23
Harsh BothraGot Cookies? Cookie Based Authentication Vulnerabilities in WildCookies are a widely used way to enable authentication in the majority of applications. Over time, there has been a lot of security…6 min read·Mar 2, 2021----
Harsh BothrainInfoSec Write-upseWPTXv2 Exam ReviewWeb Application is commonly found part of any organization’s infrastructure and often is exposed publicly and accessible by the world. Due…5 min read·Feb 16, 2021--2--2
Harsh BothraScope Based Recon: Smart Recon TacticsReconnaissance a.k.a. Recon is an essential process, especially when dealing with Black Box Penetration Testing where you have no…9 min read·Feb 16, 2021----
Harsh BothraBypassing the Protections — MFA Bypass Techniques for the WinMulti-Factor Authentication (MFA) often known as Two-Factor Authentication (2FA) is an added layer of protection added to an application…7 min read·Jan 27, 2021--1--1
Harsh BothrainInfoSec Write-upseCPPTv2 Exam ReviewThe penetration Testing domain has grown exponentially in the last couple of years and so the competition. Validating and Proving your…5 min read·Jan 12, 2021--2--2
Harsh BothrainInfoSec Write-upsEvading Filters to perform the Arbitrary URL Redirection AttackArbitrary URL Redirection Attack often is popularly known as an Open Redirection attack, which is a common web vulnerability that allows…3 min read·Nov 12, 2020--2--2