<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://feeds.buzzsprout.com/2447502.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</title>

  <lastBuildDate>Wed, 04 Mar 2026 18:52:59 -0500</lastBuildDate>
  <link>https://hackedandsecured.buzzsprout.com</link>
  <language>en</language>
  <copyright>© 2026 Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>ea509db2-e8f8-514b-abef-8edf1fff829f</podcast:guid>
  <podcast:txt purpose="verify">podcast@quailu.com.au</podcast:txt>
  <itunes:author>Amin Malekpour</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p><b>If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer.<br></b><br></p><p><em>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</em> breaks down <b>real-world pentest findings</b>, exposing how vulnerabilities were discovered, exploited, and mitigated.</p><p>Each episode dives into <b>practical security lessons</b>, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a <b>pentester, security engineer, developer, or blue teamer</b>, you'll gain <b>actionable insights to apply in your work.</b></p><p><br></p><p>🎧 <b>New episodes every month.</b></p><p><br>🌍 Follow &amp; Connect → <a href="https://www.linkedin.com/showcase/hacked-and-secured/about"><b>LinkedIn</b></a><b>, </b><a href="https://www.youtube.com/@HackedAndSecured"><b>YouTube</b></a><b>, </b><a href="https://x.com/HackedNSecured"><b>Twitter</b></a><b>, </b><a href="https://www.instagram.com/hackedandsecuredpod/"><b>Instagram</b></a><b>, </b><a href="https://hackedandsecured.buzzsprout.com/"><b>Website Link</b></a></p><p><br>📩 Submit Your Pentest Findings <b>→ </b><a href="https://forms.gle/7pPwjdaWnGYpQcA6A"><b>https://forms.gle/7pPwjdaWnGYpQcA6A</b></a><b>&nbsp; &nbsp;</b><br><br></p><p>📧 Feedback? Email Us <b>→ </b><a href="mailto:podcast@quailu.com.au"><b>podcast@quailu.com.au</b></a></p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>Offensive Security, Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, DevSecOps, Secure Coding, Web Security, Security Hardening, Secure Software Development, Security Best Practices, Red Teaming</itunes:keywords>
  <itunes:owner>
    <itunes:name>Amin Malekpour</itunes:name>
    <itunes:email>podcast@quailu.com.au</itunes:email>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/71swllvnoqsm8fwaipolc4plcvlj?.jpg</url>
     <title>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</title>
     <link>https://hackedandsecured.buzzsprout.com</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/71swllvnoqsm8fwaipolc4plcvlj?.jpg" />
  <itunes:category text="Technology" />
  <itunes:category text="Business">
    <itunes:category text="Careers" />
  </itunes:category>
  <itunes:category text="Education" />
  <podcast:person role="host" href="https://www.linkedin.com/in/amin-malekpour" img="https://storage.buzzsprout.com/1ps5i3v87dccp01b9i6k8tncus13">Amin Malekpour</podcast:person>
  <item>
    <itunes:title>Ep. 13 – nOAuth Account Misbinding &amp; Assumed-Breach to Domain Admin (Season Finale)</itunes:title>
    <title>Ep. 13 – nOAuth Account Misbinding &amp; Assumed-Breach to Domain Admin (Season Finale)</title>
    <itunes:summary><![CDATA[One misbound identity. One exposed internal path. Two routes to total compromise. In this season finale of Hacked &amp; Secured: Pentest Exploits &amp; Mitigations, we break down two real-world findings that show how small trust assumptions can unravel entire systems: nOAuth (SSO account misbinding) — Multi-tenant SSO auto-linked accounts by email instead of a stable subject/issuer identifier. With a crafted identity on a controlled domain, an attacker could land a valid session as another us...]]></itunes:summary>
    <description><![CDATA[<p><b>One misbound identity. One exposed internal path. Two routes to total compromise.</b></p><p>In this season finale of <b><em>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</em></b>, we break down two real-world findings that show how small trust assumptions can unravel entire systems:</p><ul><li>nOAuth (SSO account misbinding) — Multi-tenant SSO auto-linked accounts by email instead of a stable subject/issuer identifier. With a crafted identity on a controlled domain, an attacker could land a valid session as another user. </li><li>From wall socket to Domain Admin — No NAC on the switch enabled quiet network access, followed by username harvesting and a light password spray to a low-priv account. From there: AD enumeration, weak service credentials, and abuse of certificate services to escalate to Domain Admin.</li></ul><p><b>What you’ll learn: </b>how identity claims should be bound in modern SSO, how to harden join and mapping flows, and a practical checklist to shut down common internal escalation paths (NAC, credential hygiene, service principals, AD CS, and monitoring).</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:27 - FINDING #1 - nOAuth: the email you shouldn’t have trusted</p><p>07:22 - FINDING #2 - From one wall socket to Domain Admin</p><p>13:43 - OUTRO<br/><br/></p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p><b>One misbound identity. One exposed internal path. Two routes to total compromise.</b></p><p>In this season finale of <b><em>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</em></b>, we break down two real-world findings that show how small trust assumptions can unravel entire systems:</p><ul><li>nOAuth (SSO account misbinding) — Multi-tenant SSO auto-linked accounts by email instead of a stable subject/issuer identifier. With a crafted identity on a controlled domain, an attacker could land a valid session as another user. </li><li>From wall socket to Domain Admin — No NAC on the switch enabled quiet network access, followed by username harvesting and a light password spray to a low-priv account. From there: AD enumeration, weak service credentials, and abuse of certificate services to escalate to Domain Admin.</li></ul><p><b>What you’ll learn: </b>how identity claims should be bound in modern SSO, how to harden join and mapping flows, and a practical checklist to shut down common internal escalation paths (NAC, credential hygiene, service principals, AD CS, and monitoring).</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:27 - FINDING #1 - nOAuth: the email you shouldn’t have trusted</p><p>07:22 - FINDING #2 - From one wall socket to Domain Admin</p><p>13:43 - OUTRO<br/><br/></p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/17921866-ep-13-noauth-account-misbinding-assumed-breach-to-domain-admin-season-finale.mp3" length="10990096" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17921866</guid>
    <pubDate>Tue, 30 Sep 2025 02:00:00 +1000</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/2447502/17921866/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:27" title="FINDING #1 - nOAuth: the email you shouldn’t have trusted" />
  <psc:chapter start="7:22" title="FINDING #2 - From one wall socket to Domain Admin" />
  <psc:chapter start="13:43" title="OUTRO" />
</psc:chapters>
    <itunes:duration>909</itunes:duration>
    <itunes:keywords>Offensive Security, Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, DevSecOps, Secure Coding, Web Security, Security Hardening, Secure Software Development, Security Best Practices, Red Teaming</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 12 – Timing Attacks &amp; Mobile OAuth Hijack: When Microseconds and Misflows Betray You</itunes:title>
    <title>Ep. 12 – Timing Attacks &amp; Mobile OAuth Hijack: When Microseconds and Misflows Betray You</title>
    <itunes:summary><![CDATA[A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert. In this episode of Hacked &amp; Secured: Pentest Exploits &amp; Mitigations, we explore two subtle but devastating flaws: 🔹 Timing Attacks for Token Leaks – By measuring microsecond delays, attackers were able to recover secrets, without seeing them in responses. 🔹 OAuth Hijack via Mobile App Flows – A crafted app abused in-app browser sessions and custom URL...]]></itunes:summary>
    <description><![CDATA[<p>A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert.</p><p>In this episode of <b>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</b>, we explore two subtle but devastating flaws:</p><p>🔹 <b>Timing Attacks for Token Leaks</b> – By measuring microsecond delays, attackers were able to recover secrets, without seeing them in responses.</p><p>🔹 <b>OAuth Hijack via Mobile App Flows</b> – A crafted app abused in-app browser sessions and custom URL schemes to silently steal valid login tokens from users on iOS.</p><p>These aren’t theoretical bugs—they were found in the wild and affect real apps. If you build or test auth systems, this episode is for you.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:11 - FINDING #1 - Timing Leaks That Speak Volumes</p><p>06:56 - FINDING #2 - Hijacking Mobile OAuth with One Silent Redirect</p><p>13:06 - OUTRO<br/><br/></p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p>A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert.</p><p>In this episode of <b>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</b>, we explore two subtle but devastating flaws:</p><p>🔹 <b>Timing Attacks for Token Leaks</b> – By measuring microsecond delays, attackers were able to recover secrets, without seeing them in responses.</p><p>🔹 <b>OAuth Hijack via Mobile App Flows</b> – A crafted app abused in-app browser sessions and custom URL schemes to silently steal valid login tokens from users on iOS.</p><p>These aren’t theoretical bugs—they were found in the wild and affect real apps. If you build or test auth systems, this episode is for you.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:11 - FINDING #1 - Timing Leaks That Speak Volumes</p><p>06:56 - FINDING #2 - Hijacking Mobile OAuth with One Silent Redirect</p><p>13:06 - OUTRO<br/><br/></p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/17746293-ep-12-timing-attacks-mobile-oauth-hijack-when-microseconds-and-misflows-betray-you.mp3" length="10260031" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17746293</guid>
    <pubDate>Fri, 29 Aug 2025 07:00:00 +1000</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/2447502/17746293/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:11" title="FINDING #1 - Timing Leaks That Speak Volumes" />
  <psc:chapter start="6:56" title="FINDING #2 - Hijacking Mobile OAuth with One Silent Redirect" />
  <psc:chapter start="13:06" title="OUTRO" />
</psc:chapters>
    <itunes:duration>849</itunes:duration>
    <itunes:keywords>Offensive Security, Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, DevSecOps, Secure Coding, Web Security, Security Hardening, Secure Software Development, Security Best Practices, Red Teaming</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 11 – Account Takeover, Token Misuse, and Deserialization RCE: When Trust Goes Wrong</itunes:title>
    <title>Ep. 11 – Account Takeover, Token Misuse, and Deserialization RCE: When Trust Goes Wrong</title>
    <itunes:summary><![CDATA[One flawed password reset. One shared session token. One dangerous object. In Episode 11 of Hacked &amp; Secured: Pentest Exploits &amp; Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences. Account Takeover via Forgot Password – A predictable ID and exposed tokens let attackers reset passwords without access to email.Session Hijack in OTP Login – A logic flaw in how login tokens were handled allowed full accoun...]]></itunes:summary>
    <description><![CDATA[<p>One flawed password reset. One shared session token. One dangerous object.</p><p>In Episode 11 of <em>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</em>, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences.</p><ul><li>Account Takeover via Forgot Password – A predictable ID and exposed tokens let attackers reset passwords without access to email.</li><li>Session Hijack in OTP Login – A logic flaw in how login tokens were handled allowed full account access with just a user ID.</li><li>Remote Code Execution via Java Deserialization – A community-contributed finding where an exposed service deserialized untrusted input, leading to code execution.</li></ul><p>These aren’t complex chains. They’re common mistakes with big impact—and important lessons for developers, security teams, and testers.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>00:59 - FINDING #1 - Account Takeover via Forgot Password</p><p>06:26 - FINDING #2 - Shared Session Token in SMS Login Flow</p><p>10:39 - FINDING #3 - Java Deserialisation to Remote Code Execution</p><p>16:13 - OUTRO<br/><br/></p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p>One flawed password reset. One shared session token. One dangerous object.</p><p>In Episode 11 of <em>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</em>, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences.</p><ul><li>Account Takeover via Forgot Password – A predictable ID and exposed tokens let attackers reset passwords without access to email.</li><li>Session Hijack in OTP Login – A logic flaw in how login tokens were handled allowed full account access with just a user ID.</li><li>Remote Code Execution via Java Deserialization – A community-contributed finding where an exposed service deserialized untrusted input, leading to code execution.</li></ul><p>These aren’t complex chains. They’re common mistakes with big impact—and important lessons for developers, security teams, and testers.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>00:59 - FINDING #1 - Account Takeover via Forgot Password</p><p>06:26 - FINDING #2 - Shared Session Token in SMS Login Flow</p><p>10:39 - FINDING #3 - Java Deserialisation to Remote Code Execution</p><p>16:13 - OUTRO<br/><br/></p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/17554663-ep-11-account-takeover-token-misuse-and-deserialization-rce-when-trust-goes-wrong.mp3" length="12492773" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17554663</guid>
    <pubDate>Fri, 25 Jul 2025 07:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/17554663/transcript" type="text/html" />
    <podcast:chapters url="https://www.buzzsprout.com/2447502/17554663/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="0:59" title="FINDING #1 - Account Takeover via Forgot Password" />
  <psc:chapter start="6:26" title="FINDING #2 - Shared Session Token in SMS Login Flow" />
  <psc:chapter start="10:39" title="FINDING #3 - Java Deserialisation to Remote Code Execution" />
  <psc:chapter start="16:13" title="OUTRO" />
</psc:chapters>
    <itunes:duration>1035</itunes:duration>
    <itunes:keywords>Offensive Security, Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, DevSecOps, Secure Coding, Web Security, Security Hardening, Secure Software Development, Security Best Practices, Red Teaming</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 10 – Cookie XSS &amp; Image Upload RCE: One Cookie, One File, Full Control</itunes:title>
    <title>Ep. 10 – Cookie XSS &amp; Image Upload RCE: One Cookie, One File, Full Control</title>
    <itunes:summary><![CDATA[One cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell. This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through Ghostscript triggered by a disguised PostScript file. Learn how subtle misconfigurations turned everyday features into full account and server compromise. Chapters: 00:00 - INTRO 01:08 - FINDING #1 - Cookie-Controlled XSS 12:19 - FINDING #2 - Image ...]]></itunes:summary>
    <description><![CDATA[<p><b>One cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell.</b></p><p>This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through Ghostscript triggered by a disguised PostScript file.</p><p>Learn how subtle misconfigurations turned everyday features into full account and server compromise.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:08 - FINDING #1 - Cookie-Controlled XSS</p><p>12:19 - FINDING #2 - Image Upload to RCE via Ghostscript</p><p>19:03 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p><b>One cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell.</b></p><p>This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through Ghostscript triggered by a disguised PostScript file.</p><p>Learn how subtle misconfigurations turned everyday features into full account and server compromise.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:08 - FINDING #1 - Cookie-Controlled XSS</p><p>12:19 - FINDING #2 - Image Upload to RCE via Ghostscript</p><p>19:03 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/17375499-ep-10-cookie-xss-image-upload-rce-one-cookie-one-file-full-control.mp3" length="14620005" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17375499</guid>
    <pubDate>Fri, 27 Jun 2025 06:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/17375499/transcript" type="text/html" />
    <podcast:chapters url="https://www.buzzsprout.com/2447502/17375499/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:08" title="FINDING #1 - Cookie-Controlled XSS" />
  <psc:chapter start="12:19" title="FINDING #2 - Image Upload to RCE via Ghostscript" />
  <psc:chapter start="19:03" title="OUTRO" />
</psc:chapters>
    <itunes:duration>1212</itunes:duration>
    <itunes:keywords>Offensive Security, Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, DevSecOps, Secure Coding, Web Security, Security Hardening, Secure Software Development, Security Best Practices, Red Teaming</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 9 – Directory Traversal &amp; LFI: From File Leaks to Full Server Crash</itunes:title>
    <title>Ep. 9 – Directory Traversal &amp; LFI: From File Leaks to Full Server Crash</title>
    <itunes:summary><![CDATA[One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server.  In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single trusted path. Chapters: 00:00 - INTRO 01:07 - FINDING #1 - Server File Theft with Directory Traversal 09:23 - FINDING #2 - From File Inclusion to...]]></itunes:summary>
    <description><![CDATA[<p><b>One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server.</b><br/> In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single trusted path.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:07 - FINDING #1 - Server File Theft with Directory Traversal</p><p>09:23 - FINDING #2 - From File Inclusion to RCE via Log Poisoning</p><p>16:20 - FINDING #3 - LFI to Server Crash</p><p>24:09 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p><b>One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server.</b><br/> In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single trusted path.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:07 - FINDING #1 - Server File Theft with Directory Traversal</p><p>09:23 - FINDING #2 - From File Inclusion to RCE via Log Poisoning</p><p>16:20 - FINDING #3 - LFI to Server Crash</p><p>24:09 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/17174155-ep-9-directory-traversal-lfi-from-file-leaks-to-full-server-crash.mp3" length="18141708" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17174155</guid>
    <pubDate>Fri, 30 May 2025 06:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/17174155/transcript" type="text/html" />
    <podcast:chapters url="https://www.buzzsprout.com/2447502/17174155/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:07" title="FINDING #1 - Server File Theft with Directory Traversal" />
  <psc:chapter start="9:23" title="FINDING #2 - From File Inclusion to RCE via Log Poisoning" />
  <psc:chapter start="16:20" title="FINDING #3 - LFI to Server Crash" />
  <psc:chapter start="24:09" title="OUTRO" />
</psc:chapters>
    <itunes:duration>1505</itunes:duration>
    <itunes:keywords>Offensive Security, Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, DevSecOps, Secure Coding, Web Security, Security Hardening, Secure Software Development, Security Best Practices, Red Teaming</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 8 – OTP Flaw &amp; Remote Code Execution: When Small Flaws Go Critical</itunes:title>
    <title>Ep. 8 – OTP Flaw &amp; Remote Code Execution: When Small Flaws Go Critical</title>
    <itunes:summary><![CDATA[A broken logout flow let attackers hijack accounts using just a user ID.  A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 01:22 - FINDING #1 - The Logout That Logged You In 07:12 - FINDING #2 - From Signature Field to Shell Access 14:40 - OUTRO Want your pentest discov...]]></itunes:summary>
    <description><![CDATA[<p><b>A broken logout flow let attackers hijack accounts using just a user ID.</b><br/> A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution.</p><p>This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:22 - FINDING #1 - The Logout That Logged You In</p><p>07:12 - FINDING #2 - From Signature Field to Shell Access</p><p>14:40 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p><b>A broken logout flow let attackers hijack accounts using just a user ID.</b><br/> A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution.</p><p>This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:22 - FINDING #1 - The Logout That Logged You In</p><p>07:12 - FINDING #2 - From Signature Field to Shell Access</p><p>14:40 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/17010630-ep-8-otp-flaw-remote-code-execution-when-small-flaws-go-critical.mp3" length="11411656" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17010630</guid>
    <pubDate>Fri, 25 Apr 2025 06:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/17010630/transcript" type="text/html" />
    <podcast:chapters url="https://www.buzzsprout.com/2447502/17010630/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:22" title="FINDING #1 - The Logout That Logged You In" />
  <psc:chapter start="7:12" title="FINDING #2 - From Signature Field to Shell Access" />
  <psc:chapter start="14:40" title="OUTRO" />
</psc:chapters>
    <itunes:duration>945</itunes:duration>
    <itunes:keywords>Offensive Security, Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, DevSecOps, Secure Coding, Web Security, Security Hardening, Secure Software Development, Security Best Practices, Red Teaming</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 7 – IDOR &amp; SSTI: From File Theft to Server-Side Secrets</itunes:title>
    <title>Ep. 7 – IDOR &amp; SSTI: From File Theft to Server-Side Secrets</title>
    <itunes:summary><![CDATA[A predictable ID exposed private documents. A crafted name leaked backend files.  In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and how to stop them. Chapters: 00:00 - INTRO 01:28 - FINDING #1 – IDOR to Steal Confidential Files with Just an Attachment ID 09:05 - FINDING #2 – Serv...]]></itunes:summary>
    <description><![CDATA[<p><b>A predictable ID exposed private documents. A crafted name leaked backend files.</b><br/> In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and how to stop them.</p><p>Chapters:<br/>00:00 - INTRO<br/>01:28 - FINDING #1 – IDOR to Steal Confidential Files with Just an Attachment ID<br/>09:05 - FINDING #2 – Server-Side Template Injection That Leaked Local Files<br/>18:41 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p><b>A predictable ID exposed private documents. A crafted name leaked backend files.</b><br/> In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and how to stop them.</p><p>Chapters:<br/>00:00 - INTRO<br/>01:28 - FINDING #1 – IDOR to Steal Confidential Files with Just an Attachment ID<br/>09:05 - FINDING #2 – Server-Side Template Injection That Leaked Local Files<br/>18:41 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/16949647-ep-7-idor-ssti-from-file-theft-to-server-side-secrets.mp3" length="14182172" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16949647</guid>
    <pubDate>Fri, 11 Apr 2025 02:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/16949647/transcript" type="text/html" />
    <podcast:chapters url="https://www.buzzsprout.com/2447502/16949647/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:28" title="FINDING #1 – IDOR to Steal Confidential Files with Just an Attachment ID" />
  <psc:chapter start="9:05" title="FINDING #2 – Server-Side Template Injection That Leaked Local Files" />
  <psc:chapter start="18:41" title="OUTRO" />
</psc:chapters>
    <itunes:duration>1175</itunes:duration>
    <itunes:keywords>Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, Software Development, Blue Team, DevSecOps, Secure Coding, Security Engineering, Pentesting, Security Hardening, Secure Software Development, Security Best Practices</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 6 – 403 Bypass &amp; Request Smuggling: Tiny Tricks, Total Takeover</itunes:title>
    <title>Ep. 6 – 403 Bypass &amp; Request Smuggling: Tiny Tricks, Total Takeover</title>
    <itunes:summary><![CDATA[A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions.  In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently. Chapters: 00:00 - INTRO 01:18 - FINDING #1 – The 403 Bypass That Led to Full Admin Control 08:17 - FINDING #2 – Smuggling Requests, Hijacking Responses 1...]]></itunes:summary>
    <description><![CDATA[<p><b>A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions.</b><br/> In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently.</p><p>Chapters:<br/>00:00 - INTRO<br/>01:18 - FINDING #1 – The 403 Bypass That Led to Full Admin Control<br/>08:17 - FINDING #2 – Smuggling Requests, Hijacking Responses<br/>16:35 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p><b>A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions.</b><br/> In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently.</p><p>Chapters:<br/>00:00 - INTRO<br/>01:18 - FINDING #1 – The 403 Bypass That Led to Full Admin Control<br/>08:17 - FINDING #2 – Smuggling Requests, Hijacking Responses<br/>16:35 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/16862063-ep-6-403-bypass-request-smuggling-tiny-tricks-total-takeover.mp3" length="12482186" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16862063</guid>
    <pubDate>Fri, 28 Mar 2025 02:00:00 +1100</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/16862063/transcript" type="text/html" />
    <podcast:chapters url="https://www.buzzsprout.com/2447502/16862063/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:18" title="FINDING #1 – The 403 Bypass That Led to Full Admin Control" />
  <psc:chapter start="8:17" title="FINDING #2 – Smuggling Requests, Hijacking Responses" />
  <psc:chapter start="16:35" title="OUTRO" />
</psc:chapters>
    <itunes:duration>1034</itunes:duration>
    <itunes:keywords>Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, Software Development, Blue Team, DevSecOps, Secure Coding, Security Engineering, Pentesting, Security Hardening, Secure Software Development, Security Best Practices</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 5 – Stored XSS &amp; SQL Injection: Small Flaws, Big Breaches </itunes:title>
    <title>Ep. 5 – Stored XSS &amp; SQL Injection: Small Flaws, Big Breaches </title>
    <itunes:summary><![CDATA[A simple filename triggered stored XSS, hijacking accounts and stealing API keys. A SQL injection bypassed a web firewall, dumping an entire database in one request. Both attacks exploited basic security flaws—flaws that should have been caught. Learn how these exploits worked, why they were missed, and what should have been done differently. Chapters: 0:00 - INTRO 01:39 - FINDING #1 – Stored XSS That Took Over User Accounts 07:14 - FINDING #2 – The SQL Injection That Bypassed a Firewall and ...]]></itunes:summary>
    <description><![CDATA[<p>A simple filename triggered stored XSS, hijacking accounts and stealing API keys. A SQL injection bypassed a web firewall, dumping an entire database in one request.</p><p>Both attacks exploited basic security flaws—flaws that should have been caught.</p><p>Learn how these exploits worked, why they were missed, and what should have been done differently.</p><p>Chapters:</p><p>0:00 - INTRO</p><p>01:39 - FINDING #1 – Stored XSS That Took Over User Accounts</p><p>07:14 - FINDING #2 – The SQL Injection That Bypassed a Firewall and Dumped the Entire Database</p><p>15:22 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p>A simple filename triggered stored XSS, hijacking accounts and stealing API keys. A SQL injection bypassed a web firewall, dumping an entire database in one request.</p><p>Both attacks exploited basic security flaws—flaws that should have been caught.</p><p>Learn how these exploits worked, why they were missed, and what should have been done differently.</p><p>Chapters:</p><p>0:00 - INTRO</p><p>01:39 - FINDING #1 – Stored XSS That Took Over User Accounts</p><p>07:14 - FINDING #2 – The SQL Injection That Bypassed a Firewall and Dumped the Entire Database</p><p>15:22 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/16783977-ep-5-stored-xss-sql-injection-small-flaws-big-breaches.mp3" length="11694797" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16783977</guid>
    <pubDate>Fri, 14 Mar 2025 02:00:00 +1100</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/16783977/transcript" type="text/html" />
    <podcast:chapters url="https://www.buzzsprout.com/2447502/16783977/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:39" title="FINDING #1 – Stored XSS That Took Over User Accounts" />
  <psc:chapter start="7:14" title="FINDING #2 – The SQL Injection That Bypassed a Firewall and Dumped the Entire Database" />
  <psc:chapter start="15:22" title="OUTRO" />
</psc:chapters>
    <itunes:duration>968</itunes:duration>
    <itunes:keywords>Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, Software Development, Blue Team, DevSecOps, Secure Coding, Security Engineering, Pentesting, Security Hardening, Secure Software Development, Security Best Practices</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 4 – Exposed Secrets &amp; Silent Takeovers: How Misconfigurations Open the Door to Attackers</itunes:title>
    <title>Ep. 4 – Exposed Secrets &amp; Silent Takeovers: How Misconfigurations Open the Door to Attackers</title>
    <itunes:summary><![CDATA[Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach. In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what can be done to stop them? Listen now to learn how attackers exploit these mistakes—and how you can prevent them. Chapters: 00:00 - INTRO 01:00 - FIND...]]></itunes:summary>
    <description><![CDATA[<p>Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach.</p><p>In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what can be done to stop them?</p><p>Listen now to learn how attackers exploit these mistakes—and how you can prevent them.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:00 - FINDING #1 - How a Forgotten File Exposed Private Repositories</p><p>06:37 - FINDING #2 - How Misconfigured Permissions Led to Full System Takeover</p><p>14:35 - FINDING #3 - The Credentials That Gave Access to a Network Switch</p><p>20:31 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p>Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach.</p><p>In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what can be done to stop them?</p><p>Listen now to learn how attackers exploit these mistakes—and how you can prevent them.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:00 - FINDING #1 - How a Forgotten File Exposed Private Repositories</p><p>06:37 - FINDING #2 - How Misconfigured Permissions Led to Full System Takeover</p><p>14:35 - FINDING #3 - The Credentials That Gave Access to a Network Switch</p><p>20:31 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/16693717-ep-4-exposed-secrets-silent-takeovers-how-misconfigurations-open-the-door-to-attackers.mp3" length="15376116" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16693717</guid>
    <pubDate>Fri, 28 Feb 2025 01:00:00 +1100</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/16693717/transcript" type="text/html" />
    <podcast:chapters url="https://www.buzzsprout.com/2447502/16693717/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:00" title="FINDING #1 - How a Forgotten File Exposed Private Repositories" />
  <psc:chapter start="6:37" title="FINDING #2 - How Misconfigured Permissions Led to Full System Takeover" />
  <psc:chapter start="14:35" title="FINDING #3 - The Credentials That Gave Access to a Network Switch" />
  <psc:chapter start="20:31" title="OUTRO" />
</psc:chapters>
    <itunes:duration>1275</itunes:duration>
    <itunes:keywords>Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, Software Development, Blue Team, DevSecOps, Secure Coding, Security Engineering, Pentesting, Security Hardening, Secure Software Development, Security Best Practices</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 3 – One Request, One URL, One Bluetooth Hack: Three Takeovers That Shouldn’t Have Happened</itunes:title>
    <title>Ep. 3 – One Request, One URL, One Bluetooth Hack: Three Takeovers That Shouldn’t Have Happened</title>
    <itunes:summary><![CDATA[How can attackers take over accounts, networks, and devices—without credentials? In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough: Account Takeover – A single request bypassed email verification, locking out store owners.Internal Network Compromise – A hidden admin URL and hardcoded access key gave attackers full control.Smart Device Hijack – A community-submitted finding reveals how Bluetooth vulnerabilities allowed remote command ex...]]></itunes:summary>
    <description><![CDATA[<p>How can attackers take over accounts, networks, and devices—without credentials?</p><p>In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough:</p><ul><li><b>Account Takeover</b> – A single request bypassed email verification, locking out store owners.</li><li><b>Internal Network Compromise</b> – A hidden admin URL and hardcoded access key gave attackers full control.</li><li><b>Smart Device Hijack</b> – A <b>community-submitted finding</b> reveals how Bluetooth vulnerabilities allowed remote command execution—<b>without WiFi, passwords, or internet access.</b></li></ul><p>These findings expose critical weaknesses in application security, network defense, and IoT device protection—problems that pentesters, developers, and security teams must identify before attackers do.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:30 - FINDING #1 - How a Security Researcher Took Over an Entire Shopping Platform with Just One Request</p><p>07:25 - FINDING #2 - How a Security Researcher Hacked an Entire Internal Network with Just One URL</p><p>13:46 - FINDING #3 - How a Security Researcher Took Over a Smart Switch Using Just Bluetooth</p><p>20:47 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p>How can attackers take over accounts, networks, and devices—without credentials?</p><p>In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough:</p><ul><li><b>Account Takeover</b> – A single request bypassed email verification, locking out store owners.</li><li><b>Internal Network Compromise</b> – A hidden admin URL and hardcoded access key gave attackers full control.</li><li><b>Smart Device Hijack</b> – A <b>community-submitted finding</b> reveals how Bluetooth vulnerabilities allowed remote command execution—<b>without WiFi, passwords, or internet access.</b></li></ul><p>These findings expose critical weaknesses in application security, network defense, and IoT device protection—problems that pentesters, developers, and security teams must identify before attackers do.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:30 - FINDING #1 - How a Security Researcher Took Over an Entire Shopping Platform with Just One Request</p><p>07:25 - FINDING #2 - How a Security Researcher Hacked an Entire Internal Network with Just One URL</p><p>13:46 - FINDING #3 - How a Security Researcher Took Over a Smart Switch Using Just Bluetooth</p><p>20:47 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/16613885-ep-3-one-request-one-url-one-bluetooth-hack-three-takeovers-that-shouldn-t-have-happened.mp3" length="15555261" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16613885</guid>
    <pubDate>Fri, 14 Feb 2025 01:00:00 +1100</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/16613885/transcript" type="text/html" />
    <podcast:chapters url="https://www.buzzsprout.com/2447502/16613885/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:30" title="FINDING #1 - How a Security Researcher Took Over an Entire Shopping Platform with Just One Request" />
  <psc:chapter start="7:25" title="FINDING #2 - How a Security Researcher Hacked an Entire Internal Network with Just One URL" />
  <psc:chapter start="13:46" title="FINDING #3 - How a Security Researcher Took Over a Smart Switch Using Just Bluetooth" />
  <psc:chapter start="20:47" title="OUTRO" />
</psc:chapters>
    <itunes:duration>1290</itunes:duration>
    <itunes:keywords>Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, Software Development, Blue Team, DevSecOps, Secure Coding, Security Engineering, Pentesting, Security Hardening, Secure Software Development, Security Best Practices</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 2 – Chaining IDORs, CSRF Account Takeovers &amp; Token Manipulation for Privilege Escalation</itunes:title>
    <title>Ep. 2 – Chaining IDORs, CSRF Account Takeovers &amp; Token Manipulation for Privilege Escalation</title>
    <itunes:summary><![CDATA[What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges? In this episode of Hacked &amp; Secured: Pentest Exploits &amp; Mitigations, we break down three real-world pentest findings that prove creative exploitation turns small flaws into critical security risks: Chaining ID...]]></itunes:summary>
    <description><![CDATA[<p>What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges?</p><p>In this episode of <em>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</em>, we break down three real-world pentest findings that prove creative exploitation turns small flaws into critical security risks:</p><ul><li>Chaining IDORs for account takeover – Exploiting weak access controls.</li><li>CSRF bypass to reset security questions – Turning one click into total compromise.</li><li>Privilege escalation via token manipulation – How a simple change led to admin access.</li></ul><p>Learn how these vulnerabilities were discovered, exploited, and mitigated.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:02 - FINDING #1 - Account Takeover by Chaining Two IDORs</p><p>07:19 - FINDING #2 - Account Takeover Through CSRF Vulnerability in Security Questions</p><p>12:18 - FINDING #3 - Privilege Escalation Through Authorization Token Manipulation</p><p>17:05 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p>What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges?</p><p>In this episode of <em>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</em>, we break down three real-world pentest findings that prove creative exploitation turns small flaws into critical security risks:</p><ul><li>Chaining IDORs for account takeover – Exploiting weak access controls.</li><li>CSRF bypass to reset security questions – Turning one click into total compromise.</li><li>Privilege escalation via token manipulation – How a simple change led to admin access.</li></ul><p>Learn how these vulnerabilities were discovered, exploited, and mitigated.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:02 - FINDING #1 - Account Takeover by Chaining Two IDORs</p><p>07:19 - FINDING #2 - Account Takeover Through CSRF Vulnerability in Security Questions</p><p>12:18 - FINDING #3 - Privilege Escalation Through Authorization Token Manipulation</p><p>17:05 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/16530796-ep-2-chaining-idors-csrf-account-takeovers-token-manipulation-for-privilege-escalation.mp3" length="13954231" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16530796</guid>
    <pubDate>Fri, 31 Jan 2025 02:00:00 +1100</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/16530796/transcript" type="text/html" />
    <podcast:chapters url="https://www.buzzsprout.com/2447502/16530796/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:02" title="FINDING #1 - Account Takeover by Chaining Two IDORs" />
  <psc:chapter start="7:19" title="FINDING #2 - Account Takeover Through CSRF Vulnerability in Security Questions" />
  <psc:chapter start="12:18" title="FINDING #3 - Privilege Escalation Through Authorization Token Manipulation" />
  <psc:chapter start="17:05" title="OUTRO" />
</psc:chapters>
    <itunes:duration>1156</itunes:duration>
    <itunes:keywords>Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, Software Development, Blue Team, DevSecOps, Secure Coding, Security Engineering, Security Hardening, Secure Software Development, Security Best Practices, Pentesting</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 1 – Breaking OTP Security, Exploiting Static Domains &amp; Privilege Escalation via Role Misconfigurations</itunes:title>
    <title>Ep. 1 – Breaking OTP Security, Exploiting Static Domains &amp; Privilege Escalation via Role Misconfigurations</title>
    <itunes:summary><![CDATA[What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges? In this episode of Hacked &amp; Secured: Pentest Exploits &amp; Mitigations, we break down three real-world security failures that turned minor oversights into critical exploits: Leaking OTPs in API responses – Breaking authentication at the source.Static domain to account takeover – ...]]></itunes:summary>
    <description><![CDATA[<p>What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges?</p><p>In this episode of <em>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</em>, we break down three real-world security failures that turned minor oversights into critical exploits:</p><ul><li>Leaking OTPs in API responses – Breaking authentication at the source.</li><li>Static domain to account takeover – When persistence turns into a full exploit.</li><li>Privilege escalation via role mismanagement – How attackers bypass access controls.</li></ul><p>Learn how these vulnerabilities were discovered, exploited, and mitigated.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:00 - FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses</p><p>05:20 - FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence</p><p>12:05 - FINDING #3 - Privilege Escalation via User Invitations and Role Assignment</p><p>16:49 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p>What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges?</p><p>In this episode of <em>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</em>, we break down three real-world security failures that turned minor oversights into critical exploits:</p><ul><li>Leaking OTPs in API responses – Breaking authentication at the source.</li><li>Static domain to account takeover – When persistence turns into a full exploit.</li><li>Privilege escalation via role mismanagement – How attackers bypass access controls.</li></ul><p>Learn how these vulnerabilities were discovered, exploited, and mitigated.</p><p>Chapters:</p><p>00:00 - INTRO</p><p>01:00 - FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses</p><p>05:20 - FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence</p><p>12:05 - FINDING #3 - Privilege Escalation via User Invitations and Role Assignment</p><p>16:49 - OUTRO</p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/16530720-ep-1-breaking-otp-security-exploiting-static-domains-privilege-escalation-via-role-misconfigurations.mp3" length="13898228" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16530720</guid>
    <pubDate>Fri, 31 Jan 2025 01:00:00 +1100</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/16530720/transcript" type="text/html" />
    <podcast:soundbite startTime="10.0" duration="30.0" />
    <podcast:chapters url="https://www.buzzsprout.com/2447502/16530720/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="INTRO" />
  <psc:chapter start="1:00" title="FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses" />
  <psc:chapter start="5:20" title="FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence" />
  <psc:chapter start="12:05" title="FINDING #3 - Privilege Escalation via User Invitations and Role Assignment" />
  <psc:chapter start="16:49" title="OUTRO" />
</psc:chapters>
    <itunes:duration>1152</itunes:duration>
    <itunes:keywords>Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, Software Development, Blue Team, DevSecOps, Secure Coding, Security Engineering, Pentesting, Security Hardening, Secure Software Development, Security Best Practices</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Intro to Hacked &amp; Secured: Pentest Exploits &amp; Mitigations – What to Expect!</itunes:title>
    <title>Intro to Hacked &amp; Secured: Pentest Exploits &amp; Mitigations – What to Expect!</title>
    <itunes:summary><![CDATA[If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Welcome to Hacked &amp; Secured: Pentest Exploits &amp; Mitigations—the podcast that breaks down real-world pentest findings and exposes critical security flaws before attackers do. Red team tactics – How vulnerabilities are found and exploited. Blue team defenses – How to detect, mitigate, and prevent attacks. Real pentest insights – Lessons...]]></itunes:summary>
    <description><![CDATA[<p><b>If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer.</b></p><p>Welcome to <em>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</em>—the podcast that breaks down <b>real-world pentest findings</b> and exposes critical security flaws before attackers do.</p><ul><li><b>Red team tactics</b> – How vulnerabilities are found and exploited.</li><li> <b>Blue team defenses</b> – How to detect, mitigate, and prevent attacks.</li><li> <b>Real pentest insights</b> – Lessons from bug bounty reports, security blogs, and private pentests.</li></ul><p><b>New episodes every two weeks.</b> Follow to stay ahead of evolving threats.</p><p><b>Let’s make security knowledge accessible to all!</b></p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p><b>If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer.</b></p><p>Welcome to <em>Hacked &amp; Secured: Pentest Exploits &amp; Mitigations</em>—the podcast that breaks down <b>real-world pentest findings</b> and exposes critical security flaws before attackers do.</p><ul><li><b>Red team tactics</b> – How vulnerabilities are found and exploited.</li><li> <b>Blue team defenses</b> – How to detect, mitigate, and prevent attacks.</li><li> <b>Real pentest insights</b> – Lessons from bug bounty reports, security blogs, and private pentests.</li></ul><p><b>New episodes every two weeks.</b> Follow to stay ahead of evolving threats.</p><p><b>Let’s make security knowledge accessible to all!</b></p><p><b>Want your pentest discovery featured?</b> Submit your creative findings through the <b>Google Form in the episode description</b>, and we might showcase your finding in an upcoming episode!<br/><br/>🌍 Follow &amp; Connect → <a href='https://www.linkedin.com/showcase/hacked-and-secured/about'><b>LinkedIn</b></a><b>, </b><a href='https://www.youtube.com/@HackedAndSecured'><b>YouTube</b></a><b>, </b><a href='https://x.com/HackedNSecured'><b>Twitter</b></a><b>, </b><a href='https://www.instagram.com/hackedandsecuredpod/'><b>Instagram</b></a><b> </b><br/>📩 Submit Your Pentest Findings <b>→ https://forms.gle/7pPwjdaWnGYpQcA6A </b><br/>📧 Feedback? Email Us <b>→ </b><a href='mailto:podcast@quailu.com.au'><b>podcast@quailu.com.au</b></a><b> <br/></b>🔗 Podcast Website → <a href='https://hackedandsecured.buzzsprout.com'><b>Website Link</b></a><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2447502/episodes/16530580-intro-to-hacked-secured-pentest-exploits-mitigations-what-to-expect.mp3" length="1850624" type="audio/mpeg" />
    <link>https://hackedandsecured.buzzsprout.com</link>
    <itunes:author>Amin Malekpour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16530580</guid>
    <pubDate>Thu, 30 Jan 2025 19:00:00 +1100</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2447502/16530580/transcript" type="text/html" />
    <itunes:duration>148</itunes:duration>
    <itunes:keywords>Ethical Hacking, Bug Bounty, Penetration Testing, Application Security, Software Development, Blue Team, DevSecOps, Secure Coding, Security Engineering, Pentesting, Security Hardening, Secure Software Development, Security Best Practices</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episodeType>trailer</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
