Open in app

Sign In

Write

Sign In

Parth Shukla
Parth Shukla

161 Followers

Home

About

Pinned

GraphQL exploitation → 💶💶💶

Hello Folks 👋, Parth, this side from BUG XS team. In this blog I am going to discuss about GraphQL Injection. You can find my other write-ups here. We discuss more about GRAPHQL exploitation in our bug bounty batches.DM BUG XS for more info ❤ Let’s get started🙌 ABOUT GRAPHQL As we…

Bug Bounty

3 min read

GraphQL exploitation → 💶💶💶
GraphQL exploitation → 💶💶💶
Bug Bounty

3 min read


Pinned

OAuth Misconfig → Account Takeover

Hello Folks 👋, Parth this side from BUG XS team. In this blog I am going to explain how I found an account takeover issue on a domain. Let’s jump into vulnearblity without things like I woke up today and decided…, went for a coffee… and blah blah blah 😂 …

Bug Bounty

2 min read

OAuth Misconfig → Account Takeover
OAuth Misconfig → Account Takeover
Bug Bounty

2 min read


Mar 30, 2022

How I was able collect PII of all users

Hello Folks 👋, Parth, this side from BUG XS team. In this write up I am going to explain how I was able to retrieve Personal Identifiable Information (PII) of all users. If you want to learn more about vulnerability and exploits, don't forget to join us in our Bug…

Bug Bounty

2 min read

How I was able collect PII of all users
How I was able collect PII of all users
Bug Bounty

2 min read


Feb 7, 2022

CEH Practical Exam Guide

Exam Information Exam Title: Certified Ethical Hacker (Practical) Number of Challenges: 20 Duration: 6 hours Passing Score: 70% (14 Questions) My Experince If you are doing bug bounty hunting, then you are half way there. NMAP and wordpress knowledge is really important. Best part — Google searches are allowed (💥) Cryptographic knowledge is important …

Cybersecurity

2 min read

Cybersecurity

2 min read


Nov 22, 2021

Let’s have some Network Security Interview Questions

Hello Folks 👋, Parth, this side from BUG XS team. In this blog I am going to discuss about some commonly asked Network Security interview questions. You can find my other write-ups here. Define protocol Protocol is a defined set of rules that decide how devices in a network will communicate…

Cybersecurity

2 min read

Let’s have some Network Security Interview Questions
Let’s have some Network Security Interview Questions
Cybersecurity

2 min read


Jul 19, 2021

WTH is SNMP and SNMP polling??

Hello Folks 👋, Parth this side from BUG XS team.In this blog we are going to discuss about Simple Network Management Protocol(SNMP) and SNMP polling which is an active visibility technique. Do a clap if you found this knowledgeable.🙌 What is Simple Network Management Protocol(SNMP)? SNMP is used in network…

Cybersecurity

3 min read

WTH is SNMP and SNMP polling??
WTH is SNMP and SNMP polling??
Cybersecurity

3 min read


Jul 5, 2021

Understand Deep Packet Inspection🐱‍👤

Hello Folks 👋, Parth this side from BUG XS team.In this blog I am going to explain about Deep Packet Inspection (DPI). Unlike my other write ups this is not a bug-bounty write up. This blog is related to Cybersecurity. Clap if you find this knowledgeable and productive🙌 Let’s Start! …

Cybersecurity

4 min read

Understand Deep Packet Inspection🐱‍👤
Understand Deep Packet Inspection🐱‍👤
Cybersecurity

4 min read


Jun 11, 2021

Host Header Attack : Open Redirection

Hello Folks 👋, Parth, this side from BUG XS team. In this blog I am going to discuss about Host header attack for Open Redirection. This blog is for someone who has just started into bug bounty. If you have any queries , do reach us out here. As a…

Technology

2 min read

Host Header Attack : Open Redirection
Host Header Attack : Open Redirection
Technology

2 min read


Jun 11, 2021

Sensitive Data Exposure on renowned Airline Company

Hello Folks 👋, Welcome again! Parth this side from BUG XS team. I hope you got some information from my previous writing on Account Takeover Vulnerability. Today, I am going to discuss about a vulnearblity that I found on one of the most reputed airline company. …

Cybersecurity

2 min read

Sensitive Data Exposure on renowned Airline Company
Sensitive Data Exposure on renowned Airline Company
Cybersecurity

2 min read

Parth Shukla

Parth Shukla

161 Followers

Security Analyst, Bug XS Community Leader

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech