Look for any podcast host, guest or anyone
Showing episodes and shows of

Amin Malekpour

Shows

Hacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsEp. 11 – Account Takeover, Token Misuse, and Deserialization RCE: When Trust Goes WrongOne flawed password reset. One shared session token. One dangerous object.In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences.Account Takeover via Forgot Password – A predictable ID and exposed tokens let attackers reset passwords without access to email.Session Hijack in OTP Login – A logic flaw in how login tokens were handled allowed full account access with just a user ID.Remote Code Execution via Java Deserialization – A community-contributed finding where an exposed service deserialized untrusted input, leading to code exe...2025-07-2417 minHacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsEp. 10 – Cookie XSS & Image Upload RCE: One Cookie, One File, Full ControlOne cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell.This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through Ghostscript triggered by a disguised PostScript file.Learn how subtle misconfigurations turned everyday features into full account and server compromise.Chapters:00:00 - INTRO01:08 - FINDING #1 - Cookie-Controlled XSS12:19 - FINDING #2 - Image Upload to RCE via Ghostscript19:03 - OUTROWant yo...2025-06-2620 minHacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsEp. 9 – Directory Traversal & LFI: From File Leaks to Full Server CrashOne markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server. In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single trusted path.Chapters:00:00 - INTRO01:07 - FINDING #1 - Server File Theft with Directory Traversal09:23 - FINDING #2 - From File Inclusion to RCE via Log Poisoning16:20 - FINDING #3 - LFI to Server Cr...2025-05-2925 minHacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsEp. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go CriticalA broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution.This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences.Chapters:00:00 - INTRO01:22 - FINDING #1 - The Logout That Logged You In07:12 - FINDING #2 - From Signature Field to Shell Access14:40 - OUTROWant your pentest discovery featured? S...2025-04-2415 minHacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsEp. 7 – IDOR & SSTI: From File Theft to Server-Side SecretsA predictable ID exposed private documents. A crafted name leaked backend files. In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and how to stop them.Chapters:00:00 - INTRO01:28 - FINDING #1 – IDOR to Steal Confidential Files with Just an Attachment ID09:05 - FINDING #2 – Server-Side Template Injection That Leaked Local Files18:41 - OUTROWant your pentest discov...2025-04-1019 minHacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsEp. 6 – 403 Bypass & Request Smuggling: Tiny Tricks, Total TakeoverA single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions. In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently.Chapters:00:00 - INTRO01:18 - FINDING #1 – The 403 Bypass That Led to Full Admin Control08:17 - FINDING #2 – Smuggling Requests, Hijacking Responses16:35 - OUTROWant your pentest discovery featured? Submit your creative findings through the Google F...2025-03-2717 minHacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsEp. 5 – Stored XSS & SQL Injection: Small Flaws, Big BreachesA simple filename triggered stored XSS, hijacking accounts and stealing API keys. A SQL injection bypassed a web firewall, dumping an entire database in one request.Both attacks exploited basic security flaws—flaws that should have been caught.Learn how these exploits worked, why they were missed, and what should have been done differently.Chapters:0:00 - INTRO01:39 - FINDING #1 – Stored XSS That Took Over User Accounts07:14 - FINDING #2 – The SQL Injection That Bypassed a Firewall and Dumped the Entire Database15:22 - OUTROWant y...2025-03-1316 minHacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsEp. 4 – Exposed Secrets & Silent Takeovers: How Misconfigurations Open the Door to AttackersExposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach.In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what can be done to stop them?Listen now to learn how attackers exploit these mistakes—and how you can prevent them.Chapters:00:00 - INTRO01:00 - FINDING #1 - How a Forgotten File Exposed Private Repositories06...2025-02-2721 minHacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsEp. 3 – One Request, One URL, One Bluetooth Hack: Three Takeovers That Shouldn’t Have HappenedHow can attackers take over accounts, networks, and devices—without credentials?In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough:Account Takeover – A single request bypassed email verification, locking out store owners.Internal Network Compromise – A hidden admin URL and hardcoded access key gave attackers full control.Smart Device Hijack – A community-submitted finding reveals how Bluetooth vulnerabilities allowed remote command execution—without WiFi, passwords, or internet access.These findings expose critical weaknesses in application security, network defense, and IoT devi...2025-02-1321 minHacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsEp. 2 – Chaining IDORs, CSRF Account Takeovers & Token Manipulation for Privilege EscalationWhat if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges?In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world pentest findings that prove creative exploitation turns small flaws into critical security risks:Chaining IDORs for account takeover – Exploiting weak access controls.CSRF bypass to reset security questions – Turning one click into total compromise.Privilege escalation via token manipulation – How a si...2025-01-3019 minHacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsEp. 1 – Breaking OTP Security, Exploiting Static Domains & Privilege Escalation via Role MisconfigurationsWhat if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges?In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world security failures that turned minor oversights into critical exploits:Leaking OTPs in API responses – Breaking authentication at the source.Static domain to account takeover – When persistence turns into a full exploit.Privilege escalation via role mismanagement – How attackers bypass access controls.Learn how these vulnerabilities were discove...2025-01-3019 minHacked & Secured: Pentest Exploits & MitigationsHacked & Secured: Pentest Exploits & MitigationsIntro to Hacked & Secured: Pentest Exploits & Mitigations – What to Expect!If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer.Welcome to Hacked & Secured: Pentest Exploits & Mitigations—the podcast that breaks down real-world pentest findings and exposes critical security flaws before attackers do.Red team tactics – How vulnerabilities are found and exploited. Blue team defenses – How to detect, mitigate, and prevent attacks. Real pentest insights – Lessons from bug bounty reports, security blogs, and private pentests.New episodes every t...2025-01-3002 min