Security

Cybersecurity research, penetration testing, and vulnerability analysis

5
Posts

Your API Has Roles. That Does Not Mean Access Control Works

A practical test plan for object-level authorization, tenant isolation, and API access control bugs that survive happy-path role checks.

# Your API Has Roles. That Does Not Mean Access Control Works Most API access control bugs are not caused by missing login. They happen after login, when the backend forgets to ask a more specific q...

4 min read
713 words
İS

ibrahimsql

Cybersecurity Engineer

Read More

Social Engineering Masterclass: Hacking the Human Firewall

Technology can be patched, human nature cannot. Learn the psychological triggers behind phishing, vishing, and physical breaches in this 2025 masterclass.

# Social Engineering Masterclass: Hacking the Human The most sophisticated firewall can be bypassed by a polite phone call. Social engineering targets the weakest link in any security chain: the hum...

1 min read
199 words
İS

ibrahimsql

Cybersecurity Engineer

Read More

Attacking Secondary Contexts in Web Applications

Vulnerabilities often hide in the shadows. Learn how to exploit secondary contexts like log files, admin panels, and background jobs.

# Attacking Secondary Contexts Most bug hunters focus on the immediate response: input XSS payload, see alert box. But some of the most critical vulnerabilities happen in "secondary contexts" – plac...

2 min read
262 words
İS

ibrahimsql

Cybersecurity Engineer

Read More

Bypassing WAFs with Unicode Compatibility

Modern WAFs are tough, but Unicode normalization can be their undoing. Learn how to use compatibility characters to sneak payloads past security filters.

# Bypassing WAFs with Unicode Compatibility Web Application Firewalls (WAFs) often rely on blacklists. They block `<script>`, `javascript:`, and `alert(`. But what if we can write these words withou...

1 min read
195 words
İS

ibrahimsql

Cybersecurity Engineer

Read More

Hidden XSS? No User Interaction!

Discover the dangerous world of zero-interaction XSS. How payloads in metadata, filenames, and API responses can trigger without a single click.

# Hidden XSS? No User Interaction! We usually think of XSS as "send link to victim, victim clicks link". But the most dangerous XSS requires no interaction at all. ## Vectors for Hidden XSS ### 1....

1 min read
200 words
İS

ibrahimsql

Cybersecurity Engineer

Read More