Mar 18, 2022Setup Android App Pen-testing environment on Mac-book M1Hey folks, I hope anyone who is reading this blog post are doing great. A month ago I just switched from Mac-book Intel to M1 chip and I actually bought two M1 machines. I had to pen-test an android Application and m1 machines doesn’t support virtual box or genymotion. I…4 min read4 min read
Published inInfoSec Write-ups·Nov 17, 2017Account Take Over Vulnerability in Google acquisition [Famebit]Greetings, Myself is Hassan Khan Yusufzai and today i will share my recent finding in Google acquisition, Which is “Famebit”. I was able to take over victim account by bypassing the CSRF protection in email change functionality. What is Cross site scripting forgery? “Cross-Site Request Forgery (CSRF) is an attack…Security3 min readSecurity3 min read
Published inInfoSec Write-ups·Sep 25, 2017Device Authorization Bypass!Hello everyone this is Hassan Khan Yusufzai & i would like to share one of my finding. So its about 2 months ago when i got private invite on BugCrowd. For the sake of private programs privacy lets say it “Private.com”. So, When i was pen-testing that application i first…Cybersecurity3 min readCybersecurity3 min read
Sep 22, 2017A Story of payment gateway bypass in Rozee.pkCompanies do not pay attention to online systems, they sometimes don’t even know that their services are being compromised by hackers and hackers are enjoying the fruit on back end. This is the most common threat now a days & it can become a nightmare for a company. Myself, M.Hassan…Security3 min readSecurity3 min read