You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -311,7 +334,7 @@ <h2 class="post-title">DOM XSS: My Learning Journey</h2>
311
334
<pclass="post-description">Completed all Burp Suite DOM XSS labs, analyzed real-world cases, and explored detection using DevTools and MutationObservers.</p>
@@ -331,12 +354,20 @@ <h2 class="post-title">SQL Injection Deep Dive</h2>
331
354
<pclass="post-description">Comprehensive analysis of SQL injection techniques, from basic UNION attacks to advanced blind SQL injection methodologies.</p>
<p>In this writeup, I explored DOM-based Cross-Site Scripting (XSS) vulnerabilities. These occur when untrusted data is written to the DOM without proper sanitization.</p>
392
+
<p>I completed all Burp Suite DOM XSS labs and analyzed multiple payloads using <strong>DevTools</strong> and <strong>MutationObservers</strong> to trace JavaScript execution flows.</p>
393
+
<p>Key takeaways included understanding sinks like <code>innerHTML</code>, <code>document.write</code>, and <code>eval()</code>—and the importance of context-aware encoding.</p>
394
+
`,
395
+
gitlabbounty: `
396
+
<h2>Exploring Bug Bounty Hunting on GitLab</h2>
397
+
<p>During my week-long GitLab bug bounty practice, I focused on testing for injection, IDOR, and XSS vulnerabilities across endpoints.</p>
398
+
<p>I learned how to efficiently use <strong>Burp Suite</strong> for intercepting API calls, and how GitLab’s bounty structure encourages detailed proof-of-concept submissions.</p>
399
+
<p>This helped me refine my reconnaissance strategy and improved my payload crafting skills for web security testing.</p>
400
+
`,
401
+
sqlinjection: `
402
+
<h2>SQL Injection Deep Dive</h2>
403
+
<p>This writeup explores SQL Injection from fundamental UNION-based attacks to advanced Blind SQL Injection.</p>
404
+
<p>Key methods studied: <strong>boolean-based</strong>, <strong>time-based</strong>, and <strong>out-of-band</strong> injections.</p>
405
+
<p>I also practiced exploitation using <code>sqlmap</code> and learned preventive coding practices using parameterized queries and ORM frameworks.</p>
0 commit comments