Episodios

  • Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
    Apr 24 2025

    A broken logout flow let attackers hijack accounts using just a user ID.
    A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution.

    This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences.

    Chapters:

    00:00 - INTRO

    01:22 - FINDING #1 - The Logout That Logged You In

    07:12 - FINDING #2 - From Signature Field to Shell Access

    14:40 - OUTRO

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
    16 m
  • Ep. 7 – IDOR & SSTI: From File Theft to Server-Side Secrets
    Apr 10 2025

    A predictable ID exposed private documents. A crafted name leaked backend files.
    In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and how to stop them.

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
    20 m
  • Ep. 6 – 403 Bypass & Request Smuggling: Tiny Tricks, Total Takeover
    Mar 27 2025

    A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions.
    In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently.

    Chapters:
    00:00 - INTRO
    01:18 - FINDING #1 – The 403 Bypass That Led to Full Admin Control
    08:17 - FINDING #2 – Smuggling Requests, Hijacking Responses
    16:35 - OUTRO

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
    17 m
  • Ep. 5 – Stored XSS & SQL Injection: Small Flaws, Big Breaches
    Mar 13 2025

    A simple filename triggered stored XSS, hijacking accounts and stealing API keys. A SQL injection bypassed a web firewall, dumping an entire database in one request.

    Both attacks exploited basic security flaws—flaws that should have been caught.

    Learn how these exploits worked, why they were missed, and what should have been done differently.

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
    16 m
  • Ep. 4 – Exposed Secrets & Silent Takeovers: How Misconfigurations Open the Door to Attackers
    Feb 27 2025

    Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach.

    In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what can be done to stop them?

    Listen now to learn how attackers exploit these mistakes—and how you can prevent them.

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
    21 m
  • Ep. 3 – One Request, One URL, One Bluetooth Hack: Three Takeovers That Shouldn’t Have Happened
    Feb 13 2025

    How can attackers take over accounts, networks, and devices—without credentials?

    In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough:

    • Account Takeover – A single request bypassed email verification, locking out store owners.
    • Internal Network Compromise – A hidden admin URL and hardcoded access key gave attackers full control.
    • Smart Device Hijack – A community-submitted finding reveals how Bluetooth vulnerabilities allowed remote command execution—without WiFi, passwords, or internet access.

    These findings expose critical weaknesses in application security, network defense, and IoT device protection—problems that pentesters, developers, and security teams must identify before attackers do.

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
    22 m
  • Ep. 2 – Chaining IDORs, CSRF Account Takeovers & Token Manipulation for Privilege Escalation
    Jan 30 2025

    What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges?

    In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world pentest findings that prove creative exploitation turns small flaws into critical security risks:

    • Chaining IDORs for account takeover – Exploiting weak access controls.
    • CSRF bypass to reset security questions – Turning one click into total compromise.
    • Privilege escalation via token manipulation – How a simple change led to admin access.

    Learn how these vulnerabilities were discovered, exploited, and mitigated.

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
    19 m
  • Ep. 1 – Breaking OTP Security, Exploiting Static Domains & Privilege Escalation via Role Misconfigurations
    Jan 30 2025

    What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges?

    In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world security failures that turned minor oversights into critical exploits:

    • Leaking OTPs in API responses – Breaking authentication at the source.
    • Static domain to account takeover – When persistence turns into a full exploit.
    • Privilege escalation via role mismanagement – How attackers bypass access controls.

    Learn how these vulnerabilities were discovered, exploited, and mitigated.

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
    19 m
adbl_web_global_use_to_activate_webcro805_stickypopup