PinnedMd Tajdar Alam AnsariinSystem WeaknessJohn Hammond challenged me to hack him!!So, John Hammond puts out this post on Linkedin and tweeted which was a bit suspicious, upon verification I came to the conclusion that it…Jul 21, 20233Jul 21, 20233
PinnedMd Tajdar Alam AnsariinSystem WeaknessXXE attacks : Billion Laughs attackMd Tajdar Alam AnsariNov 5, 2022Nov 5, 2022
Md Tajdar Alam AnsariDigital Defenders CTF: Network Challenge (Protocol Crackdown) WriteupThe Capture the Flag (CTF) competition was organized by CySecK-the K-Tech Centre of Excellence in Cyber Security-in association with the…Jul 27Jul 27
Md Tajdar Alam AnsariDigital Defenders CTF: Web challenge (Xml Parser) writeupThe Capture the Flag (CTF) competition was organized by CySecK-the K-Tech Centre of Excellence in Cyber Security-in association with the…Sep 27, 2023Sep 27, 2023
Md Tajdar Alam AnsariDigital Defenders CTF: Forensics challenge (R3c0v3rytxt) writeupThe Capture the Flag (CTF) competition was organized by CySecK — the K-Tech Centre of Excellence in Cyber Security — in association with…Sep 27, 2023Sep 27, 2023
Md Tajdar Alam AnsariDigital Defenders CTF: Forensics challenge (7h3_Analyst) writeupThe Capture the Flag (CTF) competition was organized by CySecK — the K-Tech Centre of Excellence in Cyber Security — in association with…Sep 27, 2023Sep 27, 2023
Md Tajdar Alam AnsariThe Insider’s Guide to Detecting and Preventing XSS Attacks: Tips and Tricks for Web DevelopersAs a web developer, it is crucial to be aware of security vulnerabilities and how to prevent them. One of the most common types of attacks…May 9, 2023May 9, 2023
Md Tajdar Alam AnsariUnderstanding Advanced XSRF: Protecting Your Website from Cross Site Request Forgery AttackAs a website owner, you need to be aware of the different types of attacks that can target your website. One such attack is Cross Site…May 9, 2023May 9, 2023
Md Tajdar Alam AnsariThe Ultimate Xpath Injection Guide: How to Uncover Vulnerabilities in Your Bug Bounty ProgramAs a security researcher, one of the most important things you can do is to uncover vulnerabilities in web applications before attackers…May 9, 2023May 9, 2023
Md Tajdar Alam AnsariHow you can setup your own Thick Client and start Pentesting!Setting up SQL Server and DVT Application requires a thorough understanding of the installation and configuration process. In order to…May 8, 2023May 8, 2023