March 5, 2023, 7:31 a.m. | 0xrz

InfoSec Write-ups - Medium infosecwriteups.com

The Tale of a Command Injection by Changing the Logo

Hello my friends, in this write-up, I will explain how I found four P1 and two P2 bugs and showed multiple attack scenarios.

Recon

Usually, the first thing I do to get started on wide-scope programs is to find the ASNs and CIDRs of the company, through which I can reach the IPs belonging to the company. Having the company’s IPs can be very helpful in the next stages of …

bug bounty rce remote code execution response-manipulation web security writeups

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Cyber Incident Manager 3

@ ARSIEM | Pensacola, FL

On-Site Environmental Technician II - Industrial Wastewater Plant Operator and Compliance Inspector

@ AECOM | Billings, MT, United States

Sr Security Analyst

@ Everbridge | Bengaluru