エピソード

  • Ep. 11 – Account Takeover, Token Misuse, and Deserialization RCE: When Trust Goes Wrong
    2025/07/24

    One flawed password reset. One shared session token. One dangerous object.

    In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences.

    • Account Takeover via Forgot Password – A predictable ID and exposed tokens let attackers reset passwords without access to email.
    • Session Hijack in OTP Login – A logic flaw in how login tokens were handled allowed full account access with just a user ID.
    • Remote Code Execution via Java Deserialization – A community-contributed finding where an exposed service deserialized untrusted input, leading to code execution.

    These aren’t complex chains. They’re common mistakes with big impact—and important lessons for developers, security teams, and testers.

    Chapters:

    00:00 - INTRO

    00:59 - FINDING #1 - Account Takeover via Forgot Password

    06:26 - FINDING #2 - Shared Session Token in SMS Login Flow

    10:39 - FINDING #3 - Java Deserialisation to Remote Code Execution

    16:13 - OUTRO

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    続きを読む 一部表示
    17 分
  • Ep. 10 – Cookie XSS & Image Upload RCE: One Cookie, One File, Full Control
    2025/06/26

    One cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell.

    This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through Ghostscript triggered by a disguised PostScript file.

    Learn how subtle misconfigurations turned everyday features into full account and server compromise.

    Chapters:

    00:00 - INTRO

    01:08 - FINDING #1 - Cookie-Controlled XSS

    12:19 - FINDING #2 - Image Upload to RCE via Ghostscript

    19:03 - OUTRO

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    続きを読む 一部表示
    20 分
  • Ep. 9 – Directory Traversal & LFI: From File Leaks to Full Server Crash
    2025/05/29

    One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server.
    In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single trusted path.

    Chapters:

    00:00 - INTRO

    01:07 - FINDING #1 - Server File Theft with Directory Traversal

    09:23 - FINDING #2 - From File Inclusion to RCE via Log Poisoning

    16:20 - FINDING #3 - LFI to Server Crash

    24:09 - OUTRO

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    続きを読む 一部表示
    25 分
  • Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
    2025/04/24

    A broken logout flow let attackers hijack accounts using just a user ID.
    A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution.

    This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences.

    Chapters:

    00:00 - INTRO

    01:22 - FINDING #1 - The Logout That Logged You In

    07:12 - FINDING #2 - From Signature Field to Shell Access

    14:40 - OUTRO

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    続きを読む 一部表示
    16 分
  • Ep. 7 – IDOR & SSTI: From File Theft to Server-Side Secrets
    2025/04/10

    A predictable ID exposed private documents. A crafted name leaked backend files.
    In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and how to stop them.

    Chapters:
    00:00 - INTRO
    01:28 - FINDING #1 – IDOR to Steal Confidential Files with Just an Attachment ID
    09:05 - FINDING #2 – Server-Side Template Injection That Leaked Local Files
    18:41 - OUTRO

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    続きを読む 一部表示
    20 分
  • Ep. 6 – 403 Bypass & Request Smuggling: Tiny Tricks, Total Takeover
    2025/03/27

    A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions.
    In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently.

    Chapters:
    00:00 - INTRO
    01:18 - FINDING #1 – The 403 Bypass That Led to Full Admin Control
    08:17 - FINDING #2 – Smuggling Requests, Hijacking Responses
    16:35 - OUTRO

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    続きを読む 一部表示
    17 分
  • Ep. 5 – Stored XSS & SQL Injection: Small Flaws, Big Breaches
    2025/03/13

    A simple filename triggered stored XSS, hijacking accounts and stealing API keys. A SQL injection bypassed a web firewall, dumping an entire database in one request.

    Both attacks exploited basic security flaws—flaws that should have been caught.

    Learn how these exploits worked, why they were missed, and what should have been done differently.

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    続きを読む 一部表示
    16 分
  • Ep. 4 – Exposed Secrets & Silent Takeovers: How Misconfigurations Open the Door to Attackers
    2025/02/27

    Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach.

    In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what can be done to stop them?

    Listen now to learn how attackers exploit these mistakes—and how you can prevent them.

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    続きを読む 一部表示
    21 分