Account Takeover chaining IDOR and Logic Flaw
Detailed breakdown of how an Insecure Direct Object Reference (IDOR) on a password reset endpoint led to a full account takeover on a private program.
Read WriteupCybersecurity enthusiast specializing in Web Application Security and Bug Bounty hunting, with practical experience discovering vulnerabilities on real-world targets.
I am a cybersecurity student and bug bounty hunter from Egypt with hands-on experience in vulnerability assessment and manual penetration testing. I focus on discovering access control vulnerabilities such as IDOR and logic flaws.
I actively participate in bug bounty programs and continuously improve my web security skills through real-world testing. My goal is to secure the digital landscape one system at a time while expanding my knowledge of offensive security.
Active Hunter
Specialization
A sophisticated tool that automates subdomain discovery, port scanning, and general reconnaissance using aggregated sources.
A carefully constructed environment for step-by-step analysis and exploitation of complex Insecure Direct Object Reference vulnerabilities.
Detailed breakdown of how an Insecure Direct Object Reference (IDOR) on a password reset endpoint led to a full account takeover on a private program.
Read WriteupWalkthrough of complex access control bypass techniques inspired by PortSwigger Academy challenges and real-world scenarios.
Read WriteupA comprehensive guide on exploiting misconfigured web applications, from initial foothold to privilege escalation in a synthetic environment.
Read WriteupWaiting for incoming connections...