Akash PawarAdvance JSON Post Exploitation — CORS, CSRF, Broken Access ControlHey Folks, Let's start with how to exploit a JSON body which could lead to various vulnerabilities.Dec 25, 2020Dec 25, 2020
Akash PawarHTB: Walkthrough without Metasploit. ~[GRANDPA]IIS 6.0 privilege escalation using impersonationApr 8, 2020Apr 8, 2020
Akash PawarHTB: Walkthrough without Metasploit. ~[LEGACY]Let's go beyond access to the root flag.Apr 1, 20201Apr 1, 20201
Akash PawarHTB: Walkthrough without Metasploit. ~ [LAME]Hello All, this is a great time to start with OSCP preparation with the latest Hackthebox -OSCP like VM’s. The first box which we are…Apr 1, 20201Apr 1, 20201