Rafay Baloch
Shared publicly -













Google Patches Second "Same Origin Policy" Bypass Flaw in Android Browse... www.securityweek.com A Same Origin Policy (SOP) bypass vulnerability has been identified in the Android browser installed by default on versions of the operating |
A Tale Of Another SOP Bypass In Android Browser < 4.4 | Learn How To ... www.rafayhackingarticles.net Since, my recent android SOP bypass [CVE-2014-6041] triggered a lot of eruption among the infosec community, I was motivated to research a b |
Android Browser Same Origin Policy Bypass | Learn How To Hack - Ethical ... www.rafayhackingarticles.net Introduction. Same Origin Policy (SOP) is one of the most important security mechanisms that are applied in modern browsers, the basic idea |
A Simple Design Flaw In WhatsApp Leading To DOS | Learn How To Hack - Et... www.rafayhackingarticles.net WhatsApp is the choice of millions of people across the world for sending free messages, pictures, audios etc. As a reason of which it has b |
Puffin Web Browser Pop Up Recursion Vulnerability - DOS | Learn How To H... www.rafayhackingarticles.net During my recent security research on "Puffin Web Browser" I found several security bugs with "Puffin Web Browser" ranging from low to high |
Ethical Hacking and Penetration Testing Guide - Rafay Baloch - Google Books books.google.com.pk books.google.com.pk - This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking ex |
Puffin Web Browser Address Bar Spoofing Vulnerability | Learn How To Hac... www.rafayhackingarticles.net During my recent research on Mobile browsers i have managed to find couple of interesting vulnerabilities such as SOP bypass, Denial of serv |
Rhainfosec XSS Challenge 2 - Writeup | Learn How To Hack - Ethical Hacki... www.rafayhackingarticles.net We blacklisted alert, prompt, confirm, document.write functions which are most commonly used to execute javascript. We blacklisted open & cl |
A Simple Design Flaw In Qmobile's Messaging System | Learn How To Hack -... www.rafayhackingarticles.net Introduction. This post describes a simple design flaw inside of Qmobile handsets and describes why you shouldn't rely upon built in passwor |
RHAinfoSec XSS Challenge - 2 | Learn How To Hack - Ethical Hacking and s... www.rafayhackingarticles.net If all you can do is ">, then our humble apologies this challenge is not for you. The WAF can be very hard, if you don't know how to properl |
Hardening Wordpress Security By Monitoring Malicious User Activities | L... www.rafayhackingarticles.net WordPress has become the most popular content management system; it drives more than 20% of the websites on the internet. Such popularity ha |
Indispensible Need of National CERT in Pakistan | Learn How To Hack - Et... www.rafayhackingarticles.net In this advanced era where science and technology have become quite advanced, it leave not be incorrect to state that technology has become |
DDOS: The Modern Website's Kryptonite | Learn How To Hack - Ethical Hack... www.rafayhackingarticles.net Denial of Service and the Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, we |
elearnsecurity Advanced Reverse Engineering Of Software - Review | Learn... www.rafayhackingarticles.net There is a saying "To understand how something works, you must take it apart and unravel its secrets" that's exactly what reverse engineerin |
What is the .htaccess file and what do I use it for? | Learn How To Hack... www.rafayhackingarticles.net .htaccess - The Point of Discussion HT(Hyper Text) access file is actually a directory level configuration file which supports handsome numb |
DOM XSS Explained - Part 1 | Learn How To Hack - Ethical Hacking and sec... www.rafayhackingarticles.net Cross Site scripting (XSS) has been a problem for well over a decade now, XSS just like other well known security issues such as SQL, XPATH, |
Hacker's Dome - First Blood CTF | Learn How To Hack - Ethical Hacking an... www.rafayhackingarticles.net When it comes to Information Security, there's a great way to learn, train and keep sharp your skills. This can be done using gamification m |
A Tale Of A DOM Based XSS In Paypal | Learn How To Hack - Ethical Hackin... www.rafayhackingarticles.net We have already disclosed lots of findings related to DOM Based XSS and this article talks about a pretty interesting DOM Based XSS vulnerab |
A Beginners Guide To Using IPTables | Learn How To Hack - Ethical Hackin... www.rafayhackingarticles.net ABSTRACT. Readers, there are numerous reasons ... It is well known that the Internet is an unmanaged an decentralized network, running under |
The Hacker's Manifesto | Learn How To Hack - Ethical Hacking and securit... www.rafayhackingarticles.net Martial arts are part of an ancient culture, a people that has a very rich history. The term Kung Fu was created over 4000 years and at firs |