Skip to main content

Posts

Featured

WordPress Username Exposure via Sitemap on Payapps.com | Bug Bounty

  Hello, fellow cyber defenders! In today’s post, we’re diving into a low-hanging fruit vulnerability that often gets overlooked — but can have serious consequences if left unpatched. A WordPress misconfiguration was spotted on Payapps.com , where the site's author-sitemap.xml file was publicly available. This exposed internal usernames, making it easier for attackers to conduct brute-force login attacks or craft phishing emails targeting employees.

Latest Posts

Unlocking Hidden Paths: Web Fuzzing with FFUF

Bypassing 2FA to Impersonate Users on Drugs.com | Bug Bounty

DOM-Based Reflected XSS in MTN Group’s Notification Server | Bug Bounty

TryHackMe | Source | Walkthrough

Information Disclosure on Mozilla | Bug Bounty

Hack The Box - Reversing | Golfer - Part 1 | Writeup

TryHackMe | Wgel CTF | Walkthrough

Uncovering a Stored XSS Vulnerability on Drugs.com | Bug Bounty

TryHackMe | Cyborg | Writeup

Hack The Box - Misc | SecretRezipe | Writeup

TryHackMe | Ignite | Writeup

Hack The Box - Web | RenderQuest | Writeup

TryHackMe | Hydra | Walkthrough

Revealing SSRF Exploitation in inDrive's File Storage API | Bug Bounty

TryHackMe | Nmap | Walkthrough

TryHackMe | Basic Pentesting | Walkthrough

The Psychology Behind Cyber Attacks: Why Humans are the Weakest Link | Tip