Raymond LindAll About SSRF (“Server-Side Request Forgery”)Are you curious how to find SSRF vulnerabilities yourself? If so, lets take a look at what SSRF really is and go over many details of SSRF…·6 min read·Jan 30, 2023----
Raymond LindFinding Reflected XSS In A Strange WayToday I will be talking about how I foua reflected XSS (“Cross Site Scripting”) vulnerability in a very popular bug bounty program and…·9 min read·Nov 11, 2022----
Raymond LindPrivilege Escalation in Linux SystemsLooking for a way to gain root access after establishing the initial foothold in Linux systems? Here are some things to look for to…·10 min read·Oct 26, 2022----
Raymond LindSSRF Bug Leads To AWS Metadata ExposureHow can you leverage an SSRF (“Server Side Request Forgery”) vulnerability to evade filters and leak internal AWS credentials on a web…·5 min read·Oct 26, 2022--1--1
Raymond LindStored XSS To Cookie ExfiltrationToday I will be explaining an XSS (“Cross Site Scripting”) vulnerability I found in a private bug bounty program that allowed me to…·8 min read·Oct 26, 2022--1--1
Raymond LindSSRF & LFI In Uploads FeatureHello fellow hackers, today I will discuss how I found a Server-Side Request Forgery (SSRF) which lead to a Local File Inclusion (LFI) that…·6 min read·Oct 24, 2022----
Raymond LindHow I Found A Simple Stored XSSThis is the story of how I found my first Stored XSS (“Cross Site Scripting”) vulnerability in a bug bounty program and a walk through on…·4 min read·Oct 24, 2022--3--3