Recent posts
-
Intelligence—only not ours
Read more: Intelligence—only not oursIn the past few weeks, I’ve been closely observing the role of AI in software development and general work. A common debate I’ve noticed is whether AI is making humans lazy or simply less intelligent. But I believe AI hasn’t made us lazy. It has forced us to rethink rather than research. When the internet…
-
Authorization and Code Execution
Read more: Authorization and Code ExecutionThroughout my exploration of various authorization and code execution vulnerabilities, I learned some critical lessons about common weaknesses that are often overlooked in both development and security processes. Here’s a breakdown of the key findings from my studies: Authorization – 2I came across something sneaky while exploring IDOR vulnerabilities. I found that simply incrementing an…
-
Authentication and Authorization – Part 1
Read more: Authentication and Authorization – Part 1Today, we’ll dive into the basics of authentication and authorization, specifically focusing on common vulnerabilities and how they can be exploited. These types of bugs often form the foundation of real-world attacks, so getting familiar with them is key. Below is a walkthrough of a few beginner-friendly exercises that help build your intuition around these…
Follow Me On Instagram







