<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Security by Mehul]]></title><description><![CDATA[Securing One Byte At A Time]]></description><link>https://security.cybermehul.com</link><generator>RSS for Node</generator><lastBuildDate>Fri, 24 Apr 2026 18:31:34 GMT</lastBuildDate><atom:link href="https://security.cybermehul.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[How AI Deepfake attacks have evolved]]></title><description><![CDATA[In early 2024, the security space was shocked by one of the most sophisticated corporate heists. A finance employee at the Hong Kong office of Arup (A multinational professional services company), made 15 separate transfers totalling $25M to fraudste...]]></description><link>https://security.cybermehul.com/how-ai-deepfake-attacks-have-evolved</link><guid isPermaLink="true">https://security.cybermehul.com/how-ai-deepfake-attacks-have-evolved</guid><category><![CDATA[Deepfake]]></category><category><![CDATA[AI]]></category><category><![CDATA[Artificial Intelligence]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[penetration testing]]></category><category><![CDATA[ethicalhacking]]></category><category><![CDATA[hacking]]></category><dc:creator><![CDATA[Mehul Panchal]]></dc:creator><pubDate>Tue, 16 Dec 2025 19:20:24 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/XIVDN9cxOVc/upload/6c588e0a32d2a9de68f2298c7d6bd3ba.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In early 2024, the security space was shocked by one of the most sophisticated corporate heists. A finance employee at the Hong Kong office of Arup (A multinational professional services company), made 15 separate transfers totalling $25M to fraudsters. These transfers were made to 5 different Hong Kong bank accounts controlled by deepfake fraudsters.</p>
<p>The attack started conventionally with a phishing email, followed by a sophisticated real-time AI Deepfake video conference call.</p>
<p>The victim employee receives a phishing email, purportedly from the company’s UK-based Chief Financial Officer (CFO). In the following video conference call, the finance employee saw and heard people who looked and sounded like the CFO boss and some other colleagues. Interestingly enough, all participants on the call, apart from the victim, were AI-generated deepfakes.</p>
<p>The victim employee was initially suspicious of the email, but the hyper-realistic, multi-person video call convinced them the request was legitimate. The visual and auditory cues convinced them the transaction was legitimate and sanctioned by top management.</p>
<p>During the call, the deepfake participants instructed the finance employee to execute a series of high-value money transfers, keeping it as a "confidential transaction."</p>
<p>Upon discovery, Arup took immediate action, notifying the Hong Kong police about the incident of fraud in January 2024.</p>
<p>But it was too late to interrupt, wasn’t it?</p>
<p>The heist has been successful. The money is gone.</p>
<h1 id="heading-seeing-is-believing-is-an-obsolete-narrative">“Seeing is Believing” is an Obsolete Narrative</h1>
<p>AI capabilities are getting powerful each passing day. Plus, it is accessible to all of us, and attackers, more than ever before.</p>
<p>Attackers are finding new ways to attack, because we already have so many defenses against known ways of attacks. Those are mostly predictable and technical with some human applied social engineering techniques.</p>
<p>And you can easily spot these types of social engineering attacks by “believing what you’re seeing”. Easy technical defenses are good enough to defend against them as well.</p>
<p>Plus, training people to prevent phishing attacks is a proven defense mechanism most organizations use. But these technical defenses and old training don’t work on modern AI-assisted Social Engineering attacks.</p>
<p>It’s now possible for attackers to craft deepfake social engineering attacks using Artificial Intelligence (How? See the Vibe Hacking section below).</p>
<p>That’s what happened with Arup’s finance employee.</p>
<p>Attackers tricked them to transfer the money using a deepfake video conference call. And the big mistake, Arup’s employee believed what they saw.</p>
<p>But deepfake attack techniques are designed to fool even an eagle’s eye.</p>
<p>Human senses fail checks against these types of attacks because deception happens in real-time using faces and voices of the people you trust the most.</p>
<h1 id="heading-vibe-hacking-when-ai-starts-hacking-alone">Vibe Hacking: When AI Starts Hacking Alone</h1>
<p>On 13th November 2025, Anthropic reported the first major cyberattack run by an anonymous AI agent. Here’s the report: <a target="_blank" href="https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf">https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf</a></p>
<p>The attack is linked to a Chinese state-sponsored group (GTG-1002). They’re using the popular AI coding tool Anthropic Claude Code. The agent executed 80% to 90% of the hacking steps, finding information, finding weak spots, stealing passwords, and analyzing data without a human constantly telling it what to do.</p>
<p>This is the key change.</p>
<p>We’ve moved from people using AI as an assistant to AI being the hacker by itself. This increases the speed and tanks the size of attacks drastically. These attacks bypass biometric liveness checks and human verification layers as well.</p>
<p>Reports show that in the first three months of 2025 alone, the number of confirmed deepfake incidents was more than the total number in all of 2024.</p>
<p>This shows how quickly hackers are using this technology.</p>
<p>Financial losses from these scams in just Q1 2025 passed $200 million. Imagine the kind of destruction these standalone AI agents could cause in the near future.</p>
<p>We’re moving from AI-assisted Social Engineering to Standalone AI Agent Social Engineering.</p>
<h1 id="heading-how-can-we-still-prevent-future-attacks">How can we still prevent future attacks?</h1>
<p>The Double-Check Rule</p>
<p><strong>Rule</strong>: If a request comes via video or email, the employee must call the person on a known desk extension or send a quick text on a different, internal chat system.</p>
<p><strong>Protocol</strong>: Treat all urgent, secret, or high-money requests as a possible deepfake. Never confirm the request using the same app or method it was received on.</p>
<p>The Two-Person Rule</p>
<p>Change how financial approvals work to make sure at least two people approve major transactions (called a four-eyes principle), no matter who the boss is on camera.</p>
<p><strong>Principle</strong>: No one person, even the CFO, should have the power to approve giant money transfers by themselves. This simple rule makes it much harder for a single deepfake attack to succeed.</p>
<p>Train the Staff</p>
<p>Train employees to use simple, personal verification questions that an attacker who only scraped public videos (or is a basic AI) cannot answer.</p>
<p>In July 2024, a smart Ferrari executive stopped a deepfake voice-clone of their CEO, Benedetto Vigna.</p>
<p>The attacker was demanding an urgent transfer. The alert executive simply interrupted:</p>
<p>"Sorry, Benedetto, but I need to identify you,"</p>
<p>and asked a question based on a recent, private talk:</p>
<p>"What book did you recommend to me recently?"</p>
<p>The AI attacker couldn't answer and immediately hung up the call.</p>
<h1 id="heading-conclusion">Conclusion</h1>
<p>AI Deepfake Social Engineering and Standalone Hacking AI Agent attacks are real attack vectors to most organizations in the year 2025 and beyond. Ignoring this fact could prove to be destructive action. Because if your organization doesn’t evolve and adapt to the evolution of attack techniques, then being a number target of these attacks is inevitable.</p>
]]></content:encoded></item><item><title><![CDATA[When a Simple Request Change Exposes Sensitive Data: Lessons from an IDOR Vulnerability]]></title><description><![CDATA[With every pentest, I have a nice story to tell.
Recently, during an engagement, I discovered a subtle yet critical vulnerability: An Insecure Direct Object Reference (IDOR) that exposed user data.
Easy to overlook, but could have serious business co...]]></description><link>https://security.cybermehul.com/when-a-simple-request-change-exposes-sensitive-data-lessons-from-an-idor-vulnerability</link><guid isPermaLink="true">https://security.cybermehul.com/when-a-simple-request-change-exposes-sensitive-data-lessons-from-an-idor-vulnerability</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[pentesting]]></category><category><![CDATA[hacking]]></category><category><![CDATA[ethicalhacking]]></category><dc:creator><![CDATA[Mehul Panchal]]></dc:creator><pubDate>Thu, 25 Sep 2025 02:40:24 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1758768160363/3bdd145c-ecd9-4597-9c96-0207bfe791e5.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>With every pentest, I have a nice story to tell.</p>
<p>Recently, during an engagement, I discovered a subtle yet critical vulnerability: An <strong>Insecure Direct Object Reference (IDOR)</strong> that exposed user data.</p>
<p>Easy to overlook, but could have serious business consequences.</p>
<p><strong>Here’s what happened.</strong></p>
<p>I was examining an API endpoint that returned user details.</p>
<p>I noticed that it used a <strong>GET request</strong>.</p>
<p>At first glance, everything seemed secure. Changing the ID in the URL returned either the correct user’s data or an error for invalid IDs.</p>
<p><strong>It looked solid. But wait…</strong></p>
<p>Security isn’t about what appears to be, right?</p>
<p>By simply switching the <strong>request method from GET to POST</strong> and adjusting the ID in the payload, I suddenly had access to <strong>another user’s name and email</strong>, data that should have been strictly isolated.</p>
<p>Why does this matter?</p>
<ul>
<li><p><strong>Small tweaks can bypass controls</strong>: Security measures often assume certain usage patterns. Changing the request type might seem trivial, but for IDOR vulnerabilities, it can completely bypass access checks.</p>
</li>
<li><p><strong>Exposing user data damages trust</strong>: A user’s name or email can be leveraged for social engineering, phishing attacks, or account takeover.</p>
</li>
<li><p><strong>SMEs are prime targets</strong>: Attackers know that smaller organizations often rely on default security logic. Simple IDORs can quickly become gateways to larger breaches.</p>
</li>
</ul>
<h2 id="heading-takeaway">Takeaway:</h2>
<p>Don’t just secure endpoints. You have to <strong>validate access rigorously for every type of request</strong>, whether GET, POST, PATCH, DELETE or PUT.</p>
<p>Every ID should be verified against the user’s session and role.</p>
<p>If your application assumes that changing the method is harmless, that assumption is a vulnerability.</p>
<p>I recommend <strong>practical, high-impact fixes</strong>:</p>
<ol>
<li><p>Enforce <strong>server-side access control</strong> on every request. Never rely on client-side checks or request type assumptions.</p>
</li>
<li><p>Implement <strong>ID mapping or token-ization</strong> so internal IDs aren’t exposed externally.</p>
</li>
<li><p>Get your API pentested with <strong>real-world attack simulations</strong>. Small changes like request method tweaks can reveal hidden weaknesses.</p>
</li>
</ol>
<p>Security isn’t just about preventing breaches, it is more about staying ahead of the attacker’s mindset.</p>
]]></content:encoded></item><item><title><![CDATA[Stored XSS via SVG Upload]]></title><description><![CDATA[Engagement Summary
During a recent web application penetration test, I discovered a Stored Cross-Site Scripting (XSS) vulnerability by uploading a malicious SVG file containing inline JavaScript.
This blog outlines how the vulnerability was discovere...]]></description><link>https://security.cybermehul.com/stored-xss-via-svg-upload</link><guid isPermaLink="true">https://security.cybermehul.com/stored-xss-via-svg-upload</guid><category><![CDATA[#Stored-XSS]]></category><category><![CDATA[XSS]]></category><category><![CDATA[JavaScript]]></category><category><![CDATA[hacking]]></category><category><![CDATA[Ethical Hacking]]></category><category><![CDATA[SVG]]></category><category><![CDATA[File Upload]]></category><dc:creator><![CDATA[Mehul Panchal]]></dc:creator><pubDate>Sun, 03 Aug 2025 03:28:39 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/qaedPly-Uro/upload/9710b34236f32fe306bdd641567324fa.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-engagement-summary">Engagement Summary</h2>
<p>During a recent web application penetration test, I discovered a <strong>Stored Cross-Site Scripting (XSS)</strong> vulnerability by uploading a <strong>malicious SVG file</strong> containing inline JavaScript.</p>
<p>This blog outlines how the vulnerability was discovered, exploited, and responsibly disclosed.</p>
<h2 id="heading-what-is-stored-xss">What Is Stored XSS?</h2>
<p>Stored XSS occurs when user-supplied input is stored by the server (e.g., in a database or file) and later rendered in a way that executes code in other users’ browsers. In this case, the payload was stored as an SVG file and served back to users with insufficient sanitization or CSP.</p>
<hr />
<h2 id="heading-vulnerable-functionality">Vulnerable Functionality</h2>
<p>The application allowed users to upload image files, including SVGs. These images were later rendered directly into the DOM using an <code>&lt;img&gt;</code> tag.</p>
<p>Example HTML:</p>
<pre><code class="lang-plaintext">htmlCopyEdit&lt;img src="/uploads/user-image.svg"&gt;
</code></pre>
<p>Here’s the catch: the server <strong>preserved the</strong> <code>Content-Type</code> header of the uploaded file (e.g., <code>image/svg+xml</code>), and <strong>served the file inline</strong> without sanitization or restrictive CSP headers.</p>
<hr />
<h2 id="heading-the-malicious-svg-payload">The Malicious SVG Payload</h2>
<p>I crafted a minimal SVG file with embedded JavaScript:</p>
<pre><code class="lang-plaintext">xmlCopyEdit&lt;?xml version="1.0" standalone="no"?&gt;
&lt;!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN"
  "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"&gt;
&lt;svg xmlns="http://www.w3.org/2000/svg" onload="alert(document.domain)"&gt;
  &lt;circle cx="50" cy="50" r="40" stroke="black" stroke-width="2" fill="red"/&gt;
&lt;/svg&gt;
</code></pre>
<ul>
<li><p>The <code>onload</code> event on the <code>&lt;svg&gt;</code> element triggers when the image is rendered.</p>
</li>
<li><p>The payload triggers a simple <code>alert()</code> , in a real scenario, this could be replaced with data exfiltration.</p>
</li>
</ul>
<hr />
<h2 id="heading-proof-of-concept">Proof of Concept</h2>
<ol>
<li><p>Upload the malicious <code>.svg</code> file through the image upload feature.</p>
</li>
<li><p>Note the image is embedded using <code>&lt;img src="/uploads/user.svg"&gt;</code>.</p>
</li>
<li><p>When any user visits the page containing the uploaded image, the <code>onload</code> JavaScript runs in their browser.</p>
</li>
</ol>
<p>📸 <strong>Result</strong>: JavaScript executes in the victim’s browser —&gt; a stored XSS.</p>
<hr />
<h2 id="heading-why-this-works">Why This Works</h2>
<ul>
<li><p>SVG is <strong>not sanitized</strong>.</p>
</li>
<li><p>SVG allows <strong>inline JavaScript</strong> and <strong>event handlers</strong>.</p>
</li>
<li><p>Uploaded file was served with <code>Content-Type: image/svg+xml</code>.</p>
</li>
<li><p>No Content Security Policy (CSP) to restrict inline scripts.</p>
</li>
<li><p>Rendering the SVG in an <code>&lt;img&gt;</code> tag does not prevent JavaScript execution in SVGs.</p>
</li>
</ul>
<blockquote>
<p>Note: Despite common belief, <code>&lt;img src="malicious.svg"&gt;</code> <em>can</em> execute JS in some SVGs, especially in legacy or improperly configured browsers.</p>
</blockquote>
<hr />
<h2 id="heading-takeaway">Takeaway</h2>
<p>Even "image" files like SVGs can carry dangerous payloads. Always assume that uploaded files are hostile and sanitize or sandbox them appropriately.</p>
<p>There were constraints which stopped me to perform further attacks.</p>
]]></content:encoded></item><item><title><![CDATA[Let's Beat AI in Cyber Warfare]]></title><description><![CDATA[AI has gotten so powerful that I had to think about the dangers it can bring to businesses. Who knows when AI warfare starts, right? So, in the next 5 minutes, I’m going to tell you how your business can beat AI-enhanced cyber attacks and secure it e...]]></description><link>https://security.cybermehul.com/lets-beat-ai-in-cyber-warfare</link><guid isPermaLink="true">https://security.cybermehul.com/lets-beat-ai-in-cyber-warfare</guid><category><![CDATA[pentesting]]></category><category><![CDATA[hacking]]></category><category><![CDATA[AI]]></category><dc:creator><![CDATA[Mehul Panchal]]></dc:creator><pubDate>Sat, 02 Aug 2025 15:26:53 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/rDxP1tF3CmA/upload/317b76348d85a6b6cd1994b2b646c81a.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>AI has gotten so powerful that I had to think about the dangers it can bring to businesses. Who knows when AI warfare starts, right? So, in the next 5 minutes, I’m going to tell you how your business can beat AI-enhanced cyber attacks and secure it enough that hackers will think twice before attacking. Let’s get into it.</p>
<p><strong>Before the AI revolution</strong>, Hackers were using manual and automated ways to attack systems. They had to put a lot of effort into the craft of attacks. From researching the target to final exploitation, it took way too long. Along that journey, there was also a possibility for the hacker to hit a tough roadblock.</p>
<p>All in all, Hacking before the AI revolution was a tough game. The barrier to entry for a normal person to become a hacker was really high.</p>
<p><strong>AI is not Sci-fi anymore.</strong></p>
<p>Anyone can learn to use GenAI and derivatives. Due to this, most businesses will see a rise in AI based cyber attacks. There’s already a lot of successful AI-enhanced attacks by hackers, without roadblocks on their journey. It’s getting easier for people to learn AI and AI-enhanced hacking. So, cyber attacks are increasing at an insane pace.</p>
<p>A day will come when anyone with a mobile phone will be able launch an AI based cyber attack with the tap of a button. It’s not that far, considering what products are currently available in the market.</p>
<p>Existing defenses against cyber attacks won’t work anymore. You can monitor your systems endlessly with 24/7 Security Operations Centers (SOC). But that costs a lot and it’s not foolproof.</p>
<p><strong>So, how to beat AI?</strong></p>
<p>What about using AI in SOC? Aside from it being an expensive solution, it will not mitigate the security flaws that your system has.</p>
<p>Malicious actors are using AI-powered tools like PentestGPT, thanks to it being open-source. I have pointed out how Chinese hackers are using advanced systems to pentest in my post <a target="_blank" href="https://x.com/CyberMehul/status/1773230821756789224?s=46">here on 𝕏</a>. Imagine making that system AI powered.</p>
<p>In my opinion, our best weapon to beat AI based cyber attacks is AI-enhanced Penetration Tests.</p>
<p>Developers are already using AI to develop systems and fix vulnerabilities. So, using AI to enhance performance of a manual penetration tester can be extremely fruitful.</p>
<p>In this scenario, businesses deserve quick and high-quality pentest results, which is only possible using AI-powered tools. The <strong>PentestGPT</strong> is a great example of what an AI-powered penetration testing tool looks like. It can help penetration testers perform with higher quality and speed than ever before.</p>
<p>The question of the year 2025 is: Are you using AI to secure your business?</p>
]]></content:encoded></item><item><title><![CDATA[Top 10 Cyber Threats To Watchout For, In Year 2025 And Beyond]]></title><description><![CDATA[As a professional ethical hacker, I’ve seen the digital battlefield evolve firsthand.
With 2025 in full swing, cyber threats are more sophisticated, pervasive, and damaging than ever before.
Businesses, governments, and individuals are all at risk, a...]]></description><link>https://security.cybermehul.com/top-10-cyber-threats-to-watchout-for-in-year-2025-and-beyond</link><guid isPermaLink="true">https://security.cybermehul.com/top-10-cyber-threats-to-watchout-for-in-year-2025-and-beyond</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[hacking]]></category><category><![CDATA[Threats]]></category><category><![CDATA[AI]]></category><dc:creator><![CDATA[Mehul Panchal]]></dc:creator><pubDate>Sat, 02 Aug 2025 15:25:32 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/FHgWFzDDAOs/upload/d50bd3244619fca0a5e93b4a8980c79f.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As a professional ethical hacker, I’ve seen the digital battlefield evolve firsthand.</p>
<p>With 2025 in full swing, cyber threats are more sophisticated, pervasive, and damaging than ever before.</p>
<p>Businesses, governments, and individuals are all at risk, and the stakes are higher as technology becomes more integrated into our lives.</p>
<p>In this blog we're going to talk all top 10 emerging cybersecurity threats including Deepfakes and Quantum Computing ones.</p>
<p><strong>1. AI-Powered Cyberattacks</strong></p>
<p>As artificial intelligence becomes more advanced, hackers are using AI to launch smarter and faster cyberattacks.</p>
<p>These attacks can quickly bypass traditional security systems, making it harder for businesses and individuals to protect themselves.</p>
<p>The speed and complexity of these AI-driven threats mean that even the most secure systems can become vulnerable. The more advanced the AI, the harder it is to predict and stop these attacks before they cause damage.</p>
<p>It's time to implement AI-powered cybersecurity systems that can identify and block potential threats in real time. Read more about preventing ➼ <a target="_blank" href="https://blog.rockbytesec.com/lets-beat-ai-in-cyber-warfare">AI-powered Cyber Threats</a>.</p>
<hr />
<p><strong>2. Ransomware Attacks</strong></p>
<p>Ransomware attacks lock up your files or systems and demand payment in exchange for restoring access. These attacks can bring businesses to a halt and cost millions in lost data and productivity.</p>
<p>Attackers often target vulnerable systems or exploit human error to gain access.</p>
<p>Once inside, they can encrypt your files and hold them hostage, leaving you with little choice but to pay the ransom or lose your valuable information.</p>
<hr />
<p><strong>3. Data Breaches</strong></p>
<p>Data breaches expose sensitive information, like personal details, financial data, or login credentials, putting individuals and companies at risk for identity theft and financial fraud.</p>
<p>A single breach can affect millions of people and severely damage a company's reputation.</p>
<p>Even after the breach is fixed, the stolen data may be used to harm victims long after the attack.</p>
<hr />
<p><strong>4. Internet of Things (IoT) Vulnerabilities</strong></p>
<p>Many everyday devices, like smart thermostats, cameras, and wearables, connect to the internet, but these devices often lack robust security.</p>
<p>Hackers can exploit vulnerabilities to gain access to personal or business networks.</p>
<p>As more devices become interconnected, the number of potential entry points for hackers grows.</p>
<p>A single unsecured device can act as a gateway to your entire system, making it easier for attackers to infiltrate.</p>
<hr />
<p><strong>5. Phishing and Social Engineering</strong></p>
<p>Phishing attacks trick users into revealing personal information by posing as legitimate organizations or individuals. These attacks often come in the form of emails, phone calls, or messages that look trustworthy.</p>
<p>One click on a malicious link or attachment can lead to devastating consequences, like identity theft or a full system compromise.</p>
<p>Social engineering techniques make these attacks even harder to detect, as they exploit human psychology.</p>
<p>It's good to educate users about recognizing phishing attempts and always verify the sender's identity before clicking on links or providing personal information.</p>
<hr />
<p><strong>6. Cloud Security Risks</strong></p>
<p>As businesses and individuals increasingly rely on cloud services, the risk of security breaches grows.</p>
<p>Misconfigured cloud settings or weak access controls can expose sensitive data to hackers.</p>
<p>If your cloud storage or applications aren't secured properly, attackers can easily access sensitive files or even tamper with your data.</p>
<p>Cloud providers can’t always guarantee your security, especially if you're not taking necessary precautions.</p>
<hr />
<p><strong>7. Insider Threats</strong></p>
<p>Sometimes, the greatest security threat comes from within your organization.</p>
<p>Employees with access to sensitive data can intentionally or unintentionally compromise your systems.</p>
<p>Whether it's a disgruntled employee or someone simply making a mistake, insider threats can cause enormous damage. These attacks are often harder to detect because insiders have legitimate access to the systems they compromise.</p>
<p>Remember Edward Snowden?</p>
<hr />
<p><strong>8. Supply Chain Attacks</strong></p>
<p>Cybercriminals are increasingly targeting the suppliers and third-party vendors of businesses.</p>
<p>If a vendor's system is compromised, it can provide a backdoor into your company’s network.</p>
<p>These attacks can be hard to defend against because they exploit trusted relationships.</p>
<p>If a supplier’s systems are breached, attackers can then infiltrate your organization without directly targeting you.</p>
<p>I can protect your organization today from Supply Chain Attacks by simulating real-world attacks on your organization's systems.</p>
<hr />
<p><strong>9. Deepfake Technology</strong></p>
<p>Deepfake technology allows attackers to create highly convincing fake videos, audios, and images. This can be used for identity theft, spreading misinformation, or tricking individuals into transferring money or disclosing personal information.</p>
<p>The more convincing these deepfakes become, the harder it is to distinguish real from fake.</p>
<p>This poses serious risks to individuals and organizations, especially if malicious actors use them to impersonate trusted figures.</p>
<hr />
<p><strong>10. Quantum Computing Threats</strong></p>
<p>Quantum computing has the potential to break many of the encryption methods we rely on for securing data.</p>
<p>Once these systems become widely available, sensitive information could be exposed to cybercriminals.</p>
<p>As quantum computers advance, they could render current security protocols obsolete, leaving systems vulnerable to attacks.</p>
<p>Hackers with access to quantum computing could decrypt protected data at unprecedented speeds.</p>
<hr />
<p>It was pleasure for me to reveal my analysis of Top 10 Cyber Threats for year 2025.</p>
]]></content:encoded></item><item><title><![CDATA[My Top 10 Web Application Vulnerabilities]]></title><description><![CDATA[These are the top 10 vulnerabilities that I look for when I pentest a Web Application. I will be dumping all that I have learned about these vulnerabilities and their fixes in this and subsequent posts.
Here's the list of all those vulnerabilities, s...]]></description><link>https://security.cybermehul.com/rockbyte-securitys-top-10-web-application-vulnerabilities</link><guid isPermaLink="true">https://security.cybermehul.com/rockbyte-securitys-top-10-web-application-vulnerabilities</guid><category><![CDATA[vulnerabilities]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[access control]]></category><dc:creator><![CDATA[Mehul Panchal]]></dc:creator><pubDate>Sat, 02 Aug 2025 15:21:28 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/qIu77BsFdds/upload/931ebc3cd92f7645038037d77f277a13.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>These are the top 10 vulnerabilities that I look for when I pentest a Web Application. I will be dumping all that I have learned about these vulnerabilities and their fixes in this and subsequent posts.</p>
<p>Here's the list of all those vulnerabilities, so that you won't have to scroll down to know them all:</p>
<ol>
<li><p>Broken Access Control</p>
</li>
<li><p>JSON Web Token (JWT)</p>
</li>
<li><p>NoSQL injection</p>
</li>
<li><p>File Upload</p>
</li>
<li><p>SSRF</p>
</li>
<li><p>XXE</p>
</li>
<li><p>Broken Autentication</p>
</li>
<li><p>XSS</p>
</li>
<li><p>Sensitive Data Exposure</p>
</li>
<li><p>Business Logic Failure</p>
</li>
</ol>
<h4 id="heading-1-broken-access-control">1. Broken Access Control</h4>
<p>Role-Based Access Control comes into play where there's a hierarchy in an application. Just like any organisation's hierarchy, applications have their own set of roles. These roles allow users to have privileges.</p>
<p>Each role has its own set of privileges in an application. There's two types of Broken Access Control: Horizontal and Vertical.</p>
<p>To perform Horizontal BAC, you need to perform actions that another user, of same role as your user, can perform.</p>
<p>To perform Vertical BAC, you need to perform actions that another user, of a higher role than your user, can perform.</p>
<p>That's the simplest BAC explanation I could ever give. Here's few pages that you can to go down deeper into BAC:</p>
<p><a target="_blank" href="https://owasp.org/Top10/A01_2021-Broken_Access_Control/">https://owasp.org/Top10/A01_2021-Broken_Access_Control/</a></p>
<p><a target="_blank" href="https://owasp.org/www-community/Broken_Access_Control">https://owasp.org/www-community/Broken_Access_Control</a></p>
<p><a target="_blank" href="https://hackerone.com/reports/1323406">https://hackerone.com/reports/1323406</a></p>
<p><a target="_blank" href="https://hackerone.com/reports/493324">https://hackerone.com/reports/493324</a></p>
<h4 id="heading-2-json-web-token-jwt">2. JSON Web Token (JWT)</h4>
<p>JSON Web tokens can be used in a wide range of functionality where integrity is a main requirement. Most common use is in Authorization of a user. Authorizing a user into an application is a task that requires rigid parameters, so that the user can only perform the tasks that it's supposed to.</p>
<p>JWT tokens have below structure:</p>
<pre><code class="lang-plaintext">[Signature information].[DATA].[Signature]
</code></pre>
<p><strong>Signature information:</strong> It defines the algorithm that has been used to generate the <strong>Signature</strong>.</p>
<p><strong>DATA:</strong> This part of JWT has the data that contains information about the user and the session.</p>
<p>The <strong>Signature</strong> is always created with the algorithm specified in the <strong>Signature information</strong> and a secret key which is stored on the server. The server verifies the Signature of the JWT token by using this secret key into the reverse algorithm and ensures the integrity of data.</p>
<p>There are a lot of attacks which could be performed to misuse JWT tokens. All the type of attacks and their recipes are mentioned in this page: <a target="_blank" href="https://book.hacktricks.xyz/pentesting-web/hacking-jwt-json-web-tokens">https://book.hacktricks.xyz/pentesting-web/hacking-jwt-json-web-tokens</a></p>
<p>Have fun ripping apart the tokens.</p>
<h4 id="heading-3-nosql-injection">3. NoSQL injection</h4>
<p>There are various types of NoSQL databases. Most commonly used is MongoDB. But the techniques to attack these databases is almost similar.</p>
<p>Unlike regular SQL queries, NoSQL queries are constructed using JSON objects:</p>
<pre><code class="lang-plaintext">{
    object: String, 
    q: Expression, 
    fields: Array of String, 
    groupBy: Array of String, 
    aggregation: Object mapping fields to aggregate functions 
}
</code></pre>
<p>This simple query retrieves the name and salary of all employees in position of "Sales Manager":</p>
<pre><code class="lang-plaintext">{ 
    "object": "employees",
    "q": { 
        "position" : "Sales Manager"  
    },
    "fields": ["name", "salary"] 
}
</code></pre>
<p>Queries can also be used to compare an object's fields to constant values using common comparison operators. For example, to retrieve all fields for all employees under the age of 25, you can use the following query:</p>
<pre><code class="lang-plaintext">{ 
    "object": "employees",
    "q": {
        "age": { "$lt" : 25 } 
    }  
}
</code></pre>
<p>In an application, normal authentication would look like:</p>
<pre><code class="lang-plaintext">{
    "username": "admin",
    "password": "password"
}
</code></pre>
<p>An example of successful exploitation of that authentication would be:</p>
<pre><code class="lang-plaintext">{
    "username": {"$in": ["admin", "administrator", "superadmin"]},
    "password": {"$ne": ""}
}
</code></pre>
<p>All possible attack scenarios are explained by below references:</p>
<p><a target="_blank" href="https://book.hacktricks.xyz/pentesting-web/nosql-injection">https://book.hacktricks.xyz/pentesting-web/nosql-injection</a></p>
<p><a target="_blank" href="https://portswigger.net/web-security/nosql-injection">https://portswigger.net/web-security/nosql-injection</a></p>
<h4 id="heading-4-file-upload">4. File Upload</h4>
<p>File upload functionalities are most likely to be vulnerable in a Web Application, due to a lot of factors involved such as file name, extension, content, etc...</p>
<p>The first thing I do when I see a file upload functionality is that I check for what file names, extensions and contents are allowed. The best way to deal with this is to always use a wordlist to fuzz parameters of the endpoint.</p>
<p>After fuzzing, you should be able to figure out what is allowed and what is not. And according to that, it's good to conclude whether there's a way in which you could somehow upload a file with malicious content.</p>
<p>Now the malicious uploaded file doesn't have to be executing at the moment, because this very file could be used as a backdoor and can be used successfully to further exploit the application server.</p>
<p>Here's few pages that you can refer to:</p>
<p><a target="_blank" href="https://portswigger.net/web-security/file-upload">https://portswigger.net/web-security/file-upload</a></p>
<p><a target="_blank" href="https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload">https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload</a></p>
<h4 id="heading-5-ssrf">5. SSRF</h4>
<p>Backend's of modern applications usually communicate with third-party API's to exchange data, to fulfill the requirements of the application's functionality as a whole.</p>
<p>If this type of communication is somehow exposed by the backend to the frontend of the application, then it could be possible to manipulate the connection and make the backend to connect to attacker's server instead of the supposed connection to third-party API.</p>
<p>This connection to attacker's server could be used by the attacker to maliciously use the third-party service to exchange data or possibly perform remote code execution on the backend. This could compromise the whole application.</p>
<p>Here's the few pages for references:</p>
<p><a target="_blank" href="https://portswigger.net/web-security/ssrf">https://portswigger.net/web-security/ssrf</a></p>
<p><a target="_blank" href="https://owasp.org/www-community/attacks/Server_Side_Request_Forgery">https://owasp.org/www-community/attacks/Server_Side_Request_Forgery</a></p>
<h4 id="heading-6-xxe">6. XXE</h4>
<p>When an XML document containing malicious External Entity gets parsed through XML parser, it executes according to attacker's intent, then it's called XML External Entity vulnerability.</p>
<p>This attack could lead to several types of impacts including Server Side Request Forgery (SSRF) and Remote Code Execution (RCE).</p>
<p>Below is an example of non-malicious XML:</p>
<pre><code class="lang-plaintext">&lt;?xml  version="1.0" encoding="ISO-8859-1"?&gt;
&lt;!DOCTYPE note&gt;
&lt;note&gt;
&lt;to&gt;John&lt;/to&gt;
&lt;from&gt;Doe&lt;/from&gt;
&lt;heading&gt;TODO&lt;/heading&gt;
&lt;body&gt;Send an email to Donald&lt;/body&gt;
&lt;/note&gt;
</code></pre>
<p>Below is an example of malicious XML:</p>
<pre><code class="lang-plaintext">&lt;?xml  version="1.0" encoding="ISO-8859-1"?&gt;
&lt;!DOCTYPE foo [
   &lt;!ELEMENT foo ANY &gt;
   &lt;!ENTITY xxe SYSTEM  "file:///dev/random" &gt;]&gt;
&lt;foo&gt;&amp;xxe;&lt;/foo&gt;
</code></pre>
<p>An XML document with correct syntax is called "Well Formed". An XML document validated against a DTD (Document Type Definition) is both "Well Formed" and "Valid". The DTD should be defined to the parser by the application developer. If not properly defined, then it could lead to XXE attack.</p>
<p>Here's few pages for reference:</p>
<p>https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing</p>
<p><a target="_blank" href="https://www.hackerone.com/knowledge-center/xxe-complete-guide-impact-examples-and-prevention">https://www.hackerone.com/knowledge-center/xxe-complete-guide-impact-examples-and-prevention</a></p>
<h4 id="heading-7-broken-authentication">7. Broken Authentication</h4>
<p>Entrypoints of most applications is an authentication mechanism which let's legitimate users use session of the application after using their credentials.</p>
<p>But when this mechanism is not properly implemented, then the application is vulnerable to a lot of authentication attacks including use Default Credentials, broken MFA and Brute-force attacks.</p>
<p>The impact of this vulnerability depends on the domain of the application, as this may allow money laundering, social security fraud, and identity theft, or disclose legally protected highly sensitive information.</p>
<p>Here's few pages for reference:</p>
<p><a target="_blank" href="https://portswigger.net/web-security/authentication">https://portswigger.net/web-security/authentication</a></p>
<p><a target="_blank" href="https://owasp.org/www-project-top-ten/2017/A2_2017-Broken_Authentication">https://owasp.org/www-project-top-ten/2017/A2_2017-Broken_Authentication</a></p>
<h4 id="heading-8-xss">8. XSS</h4>
<p>Cross-site Scripting (XSS) attack involves executing arbitrary Javascript code on victim's browser. This could help attacker to steal victim's account information or to perform actions on behalf of victim in an application.</p>
<p>There are 3 types of XSS:</p>
<ul>
<li><p>Reflected Cross-site Scripting</p>
</li>
<li><p>Stored Cross-site Scripting</p>
</li>
<li><p>DOM-based Cross-site Scripting</p>
</li>
</ul>
<h6 id="heading-reflected-xss">Reflected XSS</h6>
<p>Attacker crafts and sends an exploit URL to the victim using social engineering. This exploit URL contains malicious characters with arbitrary javascript code in the parameter's value. Now this arbitrary javascript code get's executed when victim clicks that URL.</p>
<h6 id="heading-stored-xss">Stored XSS</h6>
<p>The attacker crafts an exploit similar to Reflected XSS but instead of sending exploit URL to victim, the attacker inserts it into an information storing function in the application or third-party application which is retrievable through another function of the application. When victim uses the retrieve function, the malicious Javascript executes.</p>
<h6 id="heading-dom-based-xss">DOM-based XSS</h6>
<p>DOM stands for Document Object Model of browsers. DOM has a source and a sink. A DOM source serves function of retrieving data from user's input and DOM sink serves the function of processing the retrieved data. Javascript takes data from sources and passes it to the sink. This attack happens when an attacker inserts malicious characters and arbitrary Javascript code into DOM source, and this code is later processed by DOM sink and the arbitrary Javascript code is executed.</p>
<p>Here's few pages for reference:</p>
<p><a target="_blank" href="https://portswigger.net/web-security/cross-site-scripting">https://portswigger.net/web-security/cross-site-scripting</a></p>
<p><a target="_blank" href="https://owasp.org/www-community/attacks/xss/">https://owasp.org/www-community/attacks/xss/</a></p>
<h4 id="heading-9-sensitive-data-exposure">9. Sensitive Data Exposure</h4>
<p>Everyone has to do their own research about where to look for this bug class, because every web application is made for a specific business logic.</p>
<p>All it takes to figure out where to look, is understanding the business logic. But some of the places are generally usable for every type of web application:</p>
<pre><code class="lang-plaintext">- Social Media

- Search engines: https://github.com/T43cr0wl3r/OSINT-RECON/blob/master/Dorking.md

- Quick Hits: https://github.com/danielmiessler/SecLists/blob/master/Discovery/Web-Content/quickhits.txt

- Github - Employee's/Contractor's property (Social Media, Portfolio etc...)

- Other OSINT methods

- Web App Errors

- AI dumps: (i.e. ChatGPT share leaks)

- WayBack Machine
</code></pre>
<h4 id="heading-10-business-logic-failure">10. Business Logic Failure</h4>
<p>Business Logic Flaws are simply failure of the application to follow the rules of business. This bug class is diverse and huge enough to understand without an example.</p>
<p>So, here's an example:</p>
<p>An e-commerce bookstore web application is designed to handle discount code. For example, there's a discount run by the company for 20% discount. An attacker tries to use the same discount code twice on total cart value of $1000, on the first try, the discount code works as expected and gives the final price to be $800.</p>
<p>Then, the attacker applies the discount code again and the application gives discount of 20% again, so the final price becomes $640. In this example, the application fails to check whether the discount code has been already used on the cart.</p>
<p>Here's few pages for reference:</p>
<p><a target="_blank" href="https://portswigger.net/web-security/logic-flaws">https://portswigger.net/web-security/logic-flaws</a></p>
<p><a target="_blank" href="https://owasp.org/www-community/vulnerabilities/Business_logic_vulnerability">https://owasp.org/www-community/vulnerabilities/Business_logic_vulnerability</a></p>
<h3 id="heading-conclusion">Conclusion</h3>
<p>These vulnerabilities are a huge challenge for any organization looking forward to make their web applications secure. Hopefully, this post by me provided you an insight on Top 10 vulnerabilities in this era of web applications. Thank you for reading and stay tuned on my 𝕏 for more posts and content like this.</p>
]]></content:encoded></item></channel></rss>