Table of ContentsIntroductionWhy Hack a Vending Machine?How Modern Vending Machines WorkExploring MQTT: The Backbone of IoT Vending MachinesHow I Found Vulnerable Machines Using CensysReconnaissance and FindingsWhy This...
Category - Bug Bounty Writeups
Table of ContentsIntroductionWhy Hack a Vending Machine?How Modern Vending Machines WorkExploring MQTT: The Backbone of IoT Vending MachinesHow I Found Vulnerable Machines Using CensysReconnaissance and FindingsWhy This...
Welcome back, amazing readers! Today, I want to share with you an important topic: how I discovered a clickjacking bug using simple HTML script. During my recon phase, I initially conducted various tests such as Open redirect...
Welcome to my very first blog! I am thrilled to have this opportunity to share my experiences and insights as a bug bounty hunter, penetration tester, and security researcher. Join me as I delve into the exciting world of...