Akash PawarAdvance JSON Post Exploitation — CORS, CSRF, Broken Access ControlHey Folks, Let's start with how to exploit a JSON body which could lead to various vulnerabilities.3 min read·Dec 25, 2020----
Akash PawarHTB: Walkthrough without Metasploit. ~[GRANDPA]IIS 6.0 privilege escalation using impersonation4 min read·Apr 8, 2020----
Akash PawarHTB: Walkthrough without Metasploit. ~[LEGACY]Let's go beyond access to the root flag.4 min read·Apr 1, 2020--1--1
Akash PawarHTB: Walkthrough without Metasploit. ~ [LAME]Hello All, this is a great time to start with OSCP preparation with the latest Hackthebox -OSCP like VM’s. The first box which we are…4 min read·Apr 1, 2020--1--1