Open in app

Sign In

Write

Sign In

jeremyah joel
jeremyah joel

41 Followers

Home

About

Apr 26, 2022

Exploiting Insecure Design -PeduliLindungi API

Today, I will share my interesting experience doing a security assessment for PeduliLindungi as a "byproduct" of my banking client assignment. Most of my clients are the largest financial service providers in SE Asia. …

4 min read

Exploiting Insecure Design -PeduliLindungi API
Exploiting Insecure Design -PeduliLindungi API

4 min read


Feb 9, 2022

Runner Up at BPJS Kesehatan Security Hackathon

Hi everyone! Today I'm going to tell you a story about how Vantage Point Security Team won First Runner Up at BPJS Kesehatan Security Hackathon! Due to the live system involved in the final round of the competition being strictly confidential, our team will not publish any official write-up/presentation deck…

Security

4 min read

Runner Up at BPJS Kesehatan Security Hackathon
Runner Up at BPJS Kesehatan Security Hackathon
Security

4 min read


Oct 2, 2021

OSCP Experience — How I Earned 100 Points in 10 Hours

Hi everyone, today I'm going to tell you my story of how I could root all five machines in my OSCP Exam and earn 100 points in just 10 hours! I hope you can get something from here that might be useful for you in your journey! It wasn't easy…

Oscp

10 min read

OSCP Experience — How I Earned 100 Points in 10 Hours
OSCP Experience — How I Earned 100 Points in 10 Hours
Oscp

10 min read


Aug 8, 2021

HTB Business CTF 2021 Web Challenges Writeup

Hi everyone! It's been a while since my last story! I miss writing here! Long story short, our team manages to solve 30 out of 44 challenges and get #13th Place out of 374 Companies Worldwide, #4 in Asia, and #1 in Indonesia! It was a really exciting and tight competition! In…

Hackthebox

6 min read

HTB Business CTF 2021 Web Challenges Writeup
HTB Business CTF 2021 Web Challenges Writeup
Hackthebox

6 min read


Nov 8, 2020

Remote Code Execution — Bypassing WAF and Filters

The injection is always a thing. Existing and settling well in OWASP Top 10 Security vulnerabilities 2007, 2010, 2013, and 2017 version - in which case made it to the first place for the last three versions, make this vulnerability is tempting to play with. Injection flaws allow attackers to…

Hacking

6 min read

Hacking

6 min read


Apr 10, 2020

Is your account safe? A way to hack public password breach.

Hi Hiiiiii Everyone!!! It's been a while since my last hacking-related post. I know you guys miss me :) So here you go. I will write a story about data breaches, how unaware people are, and how dangerous it might be in this post. Data Breach A data breach is the intentional or…

Darkweb

4 min read

Public Password Breach
Public Password Breach
Darkweb

4 min read


Dec 7, 2019

How to bypass HWID-Protected Application

HI! Hii! It's been a while since my last post (Probs almost a year as I'm somewhat busy developing my startup for now) In this post, I will show how I usually crack Premium Cheat, which uses HWID-Protection; of course, I intend to use this premium cheat for free HAHA. Introduction HWID…

4 min read

How to bypass HWID-Protected Application
How to bypass HWID-Protected Application

4 min read


Aug 6, 2019

Bypassing Cloudflare Protection -sunibcurhat Manual Database Fetching

Hai semuaaa, kali ini saya akan menceritakan pengalaman saya nge-fetch database sunibcurhat. Di post ini saya hanya akan menjelaskan gimana cara saya nge-manual fetch setelah dapat akses ke page adminnya atau yang biasa di sebut post exploitation. …

3 min read

sunibcurhat Manual Database Fetching
sunibcurhat Manual Database Fetching

3 min read

jeremyah joel

jeremyah joel

41 Followers

I like an idea of breaking into something.

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech