Open in app

Sign In

Write

Sign In

Asem Eleraky
Asem Eleraky

557 Followers

Home

About

Jan 20

Bypassing E2E encryption leads to multiple high vulnerabilities.

In today’s blog, I’m going to show you how I was able to bypass the E2E encryption of an application by analyzing an obfuscated javascript file that was imported to that application, and how this helped me to better understand the internals of this application and get to find other…

Javascript Obfuscate

9 min read

Bypassing E2E encryption leads to multiple high vulnerabilities.
Bypassing E2E encryption leads to multiple high vulnerabilities.
Javascript Obfuscate

9 min read


May 8, 2022

Can analyzing javascript files lead to remote code execution?

In today’s blog, I’m going to show you how analyzing javascript files can lead to access unrestricted endpoints and to understand how the application deals with it. I’m also gonna show you how I bypassed 2 file upload endpoints to get RCE in an ASP.NET application. First of all, This…

Rce

8 min read

Can analyzing javascript files lead to remote code execution?
Can analyzing javascript files lead to remote code execution?
Rce

8 min read


Published in InfoSec Write-ups

·Mar 13, 2022

How I bypassed disable_functions in php to get a remote shell

Today I will show you how I was able to bypass disable_functions and get a remote shell that lead me to access most of the users' files. First of all, This was a public program, but nevertheless, I will refer to it with target.com. Application logic: The objective of this target application…

Rce

5 min read

How I bypassed disable_functions in php to get a remote shell
How I bypassed disable_functions in php to get a remote shell
Rce

5 min read


Aug 23, 2021

Intigriti 0821 XSS Challenge Writeup

In this post, I am going to walk you through the Intigriti 0821 XSS Challenge, I hope you enjoy reading. Starting with the challenge page, it has three links with the same parameter (called recipe) and it takes a base64-encoded string for what will be printed on the page. Decoding…

Xss Attack

5 min read

Intigriti 0821 XSS Challenge Writeup
Intigriti 0821 XSS Challenge Writeup
Xss Attack

5 min read


Aug 1, 2021

ASCyberWargames2021 Qualifications | Retention | Web Challenge Walkthrough

In this post, I am going to walk you through a Web CTF challenge from Arab Security Cyber Wargames 2021 Qualifications, Hope you enjoy reading! Retention | 600 points Challenge description: The second time you visit us the loading would be faster. The flag must start with ASCWG❴…answer❵ First, let’s check the challenge link …

Ctf Writeup

4 min read

ASCyberWargames2021 Qualifications | Retention | Web Challenge Walkthrough
ASCyberWargames2021 Qualifications | Retention | Web Challenge Walkthrough
Ctf Writeup

4 min read


Jul 19, 2021

How I Bypassed a tough WAF to steal user cookies using XSS!

Hi, I’m Asem Eleraky -aka Melotover- and today I will show you how I could bypass a tough WAF to execute XSS and make a full account takeover via stealing the victim’s cookies. Note: I decided to make this scenario a challenge so you can try to solve it before…

Security

5 min read

How I Bypassed a tough WAF to steal user cookies using XSS!
How I Bypassed a tough WAF to steal user cookies using XSS!
Security

5 min read


Mar 24, 2021

How I leveraged XSS to make Privilege Escalation to be Super Admin!

Hi, I’m Asem Eleraky -aka Melotover- and today I will show you how I could leverage an XSS vulnerability using XHR request to make the attacker be a Super Admin on the victim account! First of all, This was a private program, so I will refer to it with example.com. Let…

Bugbounting

4 min read

How I leveraged XSS to make Privilege Escalation to be Super Admin!
How I leveraged XSS to make Privilege Escalation to be Super Admin!
Bugbounting

4 min read


Aug 15, 2020

ASCyberWargames2020 Qualifications | MeowNetwork | Forensics Challenge Writeup

In this post, I am going to walk you through a Forensics CTF challenge from Arab Security Cyber Wargames 2020 Qualifications, Hope you enjoy reading! MeowNetwork | 300 points First of all, Let’s download the File and check the description of the challenge. Challenge Description : A hacker managed to get into meownetwork and leaked sensitive files…

Ctf Writeup

3 min read

ASCyberWargames2020 Qualifications | MeowNetwork | Forensics Challenge Writeup
ASCyberWargames2020 Qualifications | MeowNetwork | Forensics Challenge Writeup
Ctf Writeup

3 min read


Aug 15, 2020

ASCyberWargames2020 Qualifications | The-Impossible-Dream | Forensics Challenge Writeup

Welcome to my first Writeup ever! In this post, I am going to walk you through a Forensics CTF challenge from Arab Security Cyber Wargames 2020 Qualifications, Hope you enjoy reading! The-Impossible-Dream | 600 points First of all, Let’s download the File and check the description of the challenge. At the first look, nothing…

Ctf Writeup

5 min read

ASCyberWargames2020 Qualifications | The-Impossible-Dream | Forensics Challenge Writeup
ASCyberWargames2020 Qualifications | The-Impossible-Dream | Forensics Challenge Writeup
Ctf Writeup

5 min read

Asem Eleraky

Asem Eleraky

557 Followers

Computer Engineering Student | Bug Hunter | CTF Player | AKA Melotover

Following
  • ِAshraf Harb

    ِAshraf Harb

  • osama alaa

    osama alaa

  • Mohamed R. Serwah

    Mohamed R. Serwah

  • Yasser Elsnbary

    Yasser Elsnbary

  • r3billions

    r3billions

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech