DEV Community

Blue Byte profile picture

Blue Byte

Ethical Hacker

Joined Joined on 

Education

Cyber Defense

Work

Penetration Tester

2FA Bypass via Response Manipulation

2FA Bypass via Response Manipulation

Comments
1 min read

Want to connect with Blue Byte?

Create an account to connect with Blue Byte. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
SSRF via Spring Cloud Gateway

SSRF via Spring Cloud Gateway

Comments
2 min read
Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param

Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param

Comments
1 min read
From debug mode enabled to PII disclosure via BFLA

From debug mode enabled to PII disclosure via BFLA

Comments
1 min read
Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover

Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover

Comments
2 min read
AWS S3 Bucket Subdomain Takeover

AWS S3 Bucket Subdomain Takeover

Comments
1 min read
Always keep this hacking technique in mind: how to enumerate AWS S3 Buckets behind a CDN

Always keep this hacking technique in mind: how to enumerate AWS S3 Buckets behind a CDN

Comments
2 min read
Easy RCE with LaTeX via file upload

Easy RCE with LaTeX via file upload

Comments
2 min read
SSRF retrieving temporary credentials from AWS Metadata

SSRF retrieving temporary credentials from AWS Metadata

Comments
1 min read
Path traversal via alias misconfiguration in Nginx

Path traversal via alias misconfiguration in Nginx

Comments
1 min read
loading...