Sailor Security

Sailor Security

  • Home
  • About Me
  • Let’s Connect
  • Exploitation of Reflected XSS Protected by CSP

    Exploitation of Reflected XSS Protected by CSP

    December 8, 2025
    1–2 minutes
    READ THIS POST: Exploitation of Reflected XSS Protected by CSP
  • Cryptographic Failure Leading to Admin Account Takeover

    Cryptographic Failure Leading to Admin Account Takeover

    August 31, 2025
    3–5 minutes
    READ THIS POST: Cryptographic Failure Leading to Admin Account Takeover
  • System File Read through Profile Picture Loading – Server Side Template Injection

    System File Read through Profile Picture Loading – Server Side Template Injection

    June 18, 2025
    2–3 minutes
    READ THIS POST: System File Read through Profile Picture Loading – Server Side Template Injection
  • Chaining Vulnerabilities: Clickjacking with DOM XSS

    Chaining Vulnerabilities: Clickjacking with DOM XSS

    April 30, 2025
    2–3 minutes
    READ THIS POST: Chaining Vulnerabilities: Clickjacking with DOM XSS
  • Authentication Attack – Bypass Brute-Force Protection

    Authentication Attack – Bypass Brute-Force Protection

    March 9, 2025
    2–3 minutes
    READ THIS POST: Authentication Attack – Bypass Brute-Force Protection
  • Responding and Handling XSS Web Attack

    Responding and Handling XSS Web Attack

    February 19, 2025
    2–3 minutes
    READ THIS POST: Responding and Handling XSS Web Attack
  • Responding and Handling FTP File Injection Attacks

    Responding and Handling FTP File Injection Attacks

    February 12, 2025
    1–2 minutes
    READ THIS POST: Responding and Handling FTP File Injection Attacks
  • Responding and Handling RDP Attack

    Responding and Handling RDP Attack

    February 12, 2025
    2–3 minutes
    READ THIS POST: Responding and Handling RDP Attack
  • Analyzing Phishing Attack

    Analyzing Phishing Attack

    February 5, 2025
    3–5 minutes
    READ THIS POST: Analyzing Phishing Attack
  • NoSQLi Attack and Prevention

    NoSQLi Attack and Prevention

    December 29, 2024
    6–9 minutes
    READ THIS POST: NoSQLi Attack and Prevention
  • API – JWT Attack and Mitigation

    API – JWT Attack and Mitigation

    October 8, 2024
    4–6 minutes
    READ THIS POST: API – JWT Attack and Mitigation
  • RCE via Apache Log Poisoning

    RCE via Apache Log Poisoning

    March 23, 2024
    3–4 minutes
    READ THIS POST: RCE via Apache Log Poisoning
1 2
Next Page

Sailor Security

Navigating the vast and unpredictable seas of cybersecurity.

  • Facebook
  • Instagram
  • WordPress
  • WhatsApp
  • LinkedIn

About

Contact

Projects

Tools

  • Subscribe Subscribed
    • Sailor Security
    • Already have a WordPress.com account? Log in now.
    • Sailor Security
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar