Subdomain Takeover Via Flywheel

The Vulnerable Subdomain
The Subscription page
Creating Page
Final Step from Exploit.
The Subdomain After Exploit.
This IP belongs to flywheel

--

--

--

Offensive Cyber Security Researcher At Resecurity

Love podcasts or audiobooks? Learn on the go with our new app.

{UPDATE} ぼくらの紙ひこうき Hack Free Resources Generator

VulnHub — Hacksudo: ProximaCentauri Walkthrough

{UPDATE} Unlock it - best game Hack Free Resources Generator

Under-the-Radar Health Information Markets: the Supply, the Demand, and the Exploited.

Data Protection Must be the Number One Enterprise Focus in 2019

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ahmed Elmalky

Ahmed Elmalky

Offensive Cyber Security Researcher At Resecurity

More from Medium

Hunting for Bugs in Shopping/Billing Feature.

WTF IS IDOR!?

Bug type: Stored Cross Site Scripting (XSS) and HTML Injection — Part 2

OTP bypass via response manipulation