Open in app
Home
Notifications
Lists
Stories

Write
Hemdeep Gamit
Hemdeep Gamit

Home
About

Published in System Weakness

·Apr 30

Bypassing File Upload Restriction using Magic Bytes

Hello Hunters & Ninjas, Article is very late, for that accept my apology. Today I’m going to write about one of my findings in which an attacker can bypass file upload restrictions using the magic bytes. So now let the hunt begin. What are magic bytes? A magic byte is nothing…

Bug Bounty

3 min read

Bypassing File Upload Restriction using Magic Bytes
Bypassing File Upload Restriction using Magic Bytes

Jan 18

Cross Site Port Attack in Wild

Hello Hunter, Sorry for the delay of post and this is my first post in this year, I hope you’re all doing well and happy. So without wasting any time let’s just start with attack. Summary: Cross Site Port Attack is an abbreviation of XSPA. In this attack an application processes…

Bug Bounty

3 min read

Cross Site Port Attack in Wild
Cross Site Port Attack in Wild

Nov 24, 2021

Misconfigured Social Login(OAuth) Leads to Permanent account access

Hello Hunters, This article is about one of my finding in which an user can access the account which is not belong to him via social login. Without wasting any time let’s just start with attack. An application allows user to register themselves using the FORM registration and using social…

Bug Bounty

2 min read

Misconfigured Social Login(OAuth) Leads to Permanent account access
Misconfigured Social Login(OAuth) Leads to Permanent account access

Nov 19, 2021

Pre-Authentication Account Take-Over

Hello Hunters, Today I’m going to tell about one of my interesting and rare finding which is Pre-Authentication Account Take-Over. For who doesn’t know about the what is the attack is all about, I would like suggest to first go through this Awesome Write Up by Mr. …

Bug Bounty

4 min read

Pre-Authentication Account Take-Over
Pre-Authentication Account Take-Over

Nov 13, 2021

OTP Bypass via response manipulation

Hello Hunters, today I'm going tell about my one of the finding in which I'm able to bypass the OTP page. So let’s begin. It’s an private program so, I'm not disclose it’s name, let’s call as example.com Now the example.com allows user to register and use it’s functionality but…

Bug Bounty

2 min read

OTP Bypass via response manipulation
OTP Bypass via response manipulation

Nov 9, 2021

Email Validation Bypass

Hello Everyone, I’m Hemdeep Gamit, I'm Security Researcher, I hope you’re all doing well, this my first article so please just do ignore my grammar as English is not my first language. So today I’m write this article about my last finding in which I’m able to bypass the email…

Bug Bounty

1 min read

Email Validation Bypass
Email Validation Bypass
Hemdeep Gamit

Hemdeep Gamit

Garv se Bhartiya, Security Enthusiast.

Following
  • Thexssrat

    Thexssrat

  • Jerry Shah (Jerry)

    Jerry Shah (Jerry)

  • Antara Mane

    Antara Mane

  • Veshraj Ghimire

    Veshraj Ghimire

  • Vickie Li

    Vickie Li

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable