Security

Two Captcha Bypasses — IDOR and Token Reuse
Two Captcha Bypasses — …

This is my first write-up here. I will talk about how I bypassed captcha on two companies.

First One (Captcha Token Reuse)

While testing a site.example.com, I found that signing up on their site had a captcha. I solved the captcha challenge and captured the request with credentials, and I saw the …

Evade Network Scanners with Firewall
Evade Network Scanners …

We all know the most common network scanner NMAP. The mechanism that all network scanners work with is testing kernel network transport layer protocol response [ICMP / TCP / UDP / SCTP] across the whole 65,000 ports.

Now, how do scanners know if a port is open / closed / filtered? If you don’t …

Computer Security & Binary Hacking Concepts and Basics
Computer Security & …

Hey! I am an Egyptian computer security researcher and I wanted to share knowledge about binary hacking for you all.

Facebook: https://www.facebook.com/mahmoudadel0x

Let’s start. I will talk about three topics for now, and in the next session I will continue:

  1. Computer memory and virtual …