39 Articles

All Articles

Browse all cybersecurity articles, bug bounty writeups, penetration testing tutorials, and security tool reviews published on White Hats Nepal.

OAuth Misconfiguration Bug Bounty: Expert Exploitation Guide
New

OAuth Misconfiguration Bug Bounty: Expert Exploitation Guide

Master OAuth misconfiguration bug bounty hunting. Learn to exploit redirect URI bypasses, CSRF, and account takeovers with this technical pentesting guide.

May 18, 2026
Prototype Pollution Exploitation: A Pentester's Practical Guide
New

Prototype Pollution Exploitation: A Pentester's Practical Guide

Master prototype pollution exploitation with this technical guide. Learn to identify vulnerable sinks, chain gadgets for XSS/RCE, and secure Node.js apps.

May 18, 2026
IDOR Vulnerability Writeup: Exploiting Insecure Direct Object References
New

IDOR Vulnerability Writeup: Exploiting Insecure Direct Object References

Master IDOR vulnerabilities with this expert writeup. Learn advanced bypass techniques, automation tools, and remediation strategies for modern web apps.

May 16, 2026
HTTP Request Smuggling Explained: A Pentester's Guide
New

HTTP Request Smuggling Explained: A Pentester's Guide

Master HTTP request smuggling to bypass security controls and hijack sessions. Learn CL.TE and TE.CL techniques with practical exploitation examples.

May 15, 2026
API Pentesting Methodology: A Pro Security Testing Guide
New

API Pentesting Methodology: A Pro Security Testing Guide

Master the API pentesting methodology with this technical guide. Learn how to find BOLA, Mass Assignment, and JWT flaws like a professional researcher.

May 14, 2026
XXE Attack Tutorial: A Practical Guide for Pentesters
New

XXE Attack Tutorial: A Practical Guide for Pentesters

Learn how to exploit XML External Entity (XXE) vulnerabilities. This tutorial covers LFI, SSRF, Blind XXE, and OOB exfiltration for bug bounty hunters.

May 13, 2026
Directory Bruteforce Tools: Best Pointers for Pentesters
New

Directory Bruteforce Tools: Best Pointers for Pentesters

Explore the top directory bruteforce tools like ffuf and Gobuster. Learn how to find hidden files and directories in professional security audits.

May 12, 2026
Pentest Checklist: A Pro's Guide to Systematic Security Testing
New

Pentest Checklist: A Pro's Guide to Systematic Security Testing

Master your next engagement with this technical pentest checklist. From recon to post-exploitation, we cover the exact steps used by industry experts.

May 11, 2026
BloodHound Active Directory: Finding Hidden Attack Paths
New

BloodHound Active Directory: Finding Hidden Attack Paths

Master BloodHound for Active Directory security. Learn how to map complex attack paths, identify privilege escalation risks, and secure your AD infrastructure.

May 10, 2026
Network Penetration Testing Methodology: A Pro Pentester's Guide
New

Network Penetration Testing Methodology: A Pro Pentester's Guide

Master the network penetration testing methodology used by pros. Learn recon, scanning, exploitation, and lateral movement with this hands-on guide.

May 09, 2026
SSRF Vulnerability Example: A Pentester's Guide to Exploitation
New

SSRF Vulnerability Example: A Pentester's Guide to Exploitation

Learn how SSRF works with this practical SSRF vulnerability example. Explore cloud metadata theft, internal port scanning, and bypass techniques for bug hunters.

May 08, 2026
Subdomain Enumeration Tools: A Pentester's Deep Dive
New

Subdomain Enumeration Tools: A Pentester's Deep Dive

Master subdomain enumeration tools for bug bounties and red team ops. Discover practical techniques, powerful scripts, and essential strategies from a seasoned pentester.

May 07, 2026
Web Application Security Testing Guide: A Deep Dive for Pentesters
New

Web Application Security Testing Guide: A Deep Dive for Pentesters

Master web application security testing with this practical guide. Learn methodologies, essential tools, and real-world techniques for bug bounty hunters and appsec engineers.

May 06, 2026
Windows Privilege Escalation Cheatsheet: Your Ultimate Guide for Pentesters
New

Windows Privilege Escalation Cheatsheet: Your Ultimate Guide for Pentesters

Master Windows privilege escalation with this comprehensive cheatsheet. Learn common techniques, tools, and practical examples for red teamers and bug bounty hunters.

May 05, 2026
Hashcat Tutorial: Master Password Cracking with Hashcat
New

Hashcat Tutorial: Master Password Cracking with Hashcat

Unlock the power of Hashcat for password cracking. This deep dive covers setup, attack modes, and advanced techniques for pentesters, red teamers, and bug bounty hunters.

May 04, 2026
Unmasking CSRF Attacks: A Pentester's Practical Guide
New

Unmasking CSRF Attacks: A Pentester's Practical Guide

Dive deep into CSRF attacks, understand how they work, and learn practical detection and exploitation techniques for bug bounty hunters and pentesters.

May 03, 2026
Linux Privilege Escalation: A Pentester's Practical Guide
New

Linux Privilege Escalation: A Pentester's Practical Guide

Master Linux privilege escalation techniques with this practical guide for pentesters. Learn hands-on methods, common vulnerabilities, and real-world scenarios to elevate privil…

May 02, 2026
Active Directory Attack Techniques: A Pentester's Practical Guide
New

Active Directory Attack Techniques: A Pentester's Practical Guide

Explore common Active Directory attack techniques used by red teamers and bug bounty hunters. Learn practical AD exploitation methods, tools, and real-world scenarios.

May 01, 2026
XSS Attack Example: A Deep Dive for Pentesters & Bug Bounty Hunters
New

XSS Attack Example: A Deep Dive for Pentesters & Bug Bounty Hunters

Explore real-world XSS attack examples, from reflected to DOM-based. Learn how to find, exploit, and prevent Cross-Site Scripting vulnerabilities with practical, code-heavy insi…

Apr 30, 2026
Mimikatz Tutorial: A Deep Dive for Pentesters & Red Teamers
New

Mimikatz Tutorial: A Deep Dive for Pentesters & Red Teamers

Master Mimikatz for penetration testing and red teaming. This comprehensive tutorial covers installation, credential dumping, DCSync attacks, and defense strategies. Practical c…

Apr 29, 2026
Burp Suite Tutorial for Pentesters: Your Ultimate Guide
New

Burp Suite Tutorial for Pentesters: Your Ultimate Guide

Master Burp Suite for web app security testing. This comprehensive tutorial covers setup, proxy, scanner, intruder, repeater, and more. Essential for bug bounty hunters and pent…

Apr 28, 2026
Bug Bounty for Beginners: Your First Steps to Finding Vulnerabilities
New

Bug Bounty for Beginners: Your First Steps to Finding Vulnerabilities

Ready to start bug bounty hunting? This guide for beginners covers essential skills, tools, and strategies to find your first vulnerability and earn rewards. Practical tips from…

Apr 27, 2026
Metasploit Tutorial for Pentesters: Your Ultimate Exploitation Guide
New

Metasploit Tutorial for Pentesters: Your Ultimate Exploitation Guide

Master Metasploit with this hands-on tutorial. Learn setup, scanning, exploitation, and post-exploitation techniques for effective penetration testing and bug bounties.

Apr 26, 2026
HackTheBox CTF Walkthroughs: A Pentester's Practical Guide
New

HackTheBox CTF Walkthroughs: A Pentester's Practical Guide

Master HackTheBox CTF walkthroughs with this expert guide. Learn practical techniques, tools, and strategies for penetration testing and bug bounty hunting.

Apr 25, 2026
Reverse Shell Cheatsheet: Your Ultimate Pentesting Guide
New

Reverse Shell Cheatsheet: Your Ultimate Pentesting Guide

Master reverse shells with this ultimate cheatsheet for pentesters & bug bounty hunters. Get practical code examples, bypass techniques, and troubleshooting tips.

Apr 24, 2026
OWASP Top 10 Explained: A Pentester's Practical Guide
New

OWASP Top 10 Explained: A Pentester's Practical Guide

Dive deep into the OWASP Top 10 with practical insights, real-world examples, and hands-on advice for bug bounty hunters, red teamers, and AppSec engineers. Master critical web …

Apr 23, 2026
Nmap Tutorial for Pentesters: Deep Dive into Network Scanning
New

Nmap Tutorial for Pentesters: Deep Dive into Network Scanning

Master Nmap with this in-depth tutorial for pentesters, bug bounty hunters, and red teamers. Learn essential commands, advanced scripts, and practical scanning techniques.

Apr 22, 2026
Wireshark Tutorial for Pentesters: Deep Dive into Packet Analysis
New

Wireshark Tutorial for Pentesters: Deep Dive into Packet Analysis

Master Wireshark for penetration testing and bug bounty hunting. This practical Wireshark tutorial covers installation, advanced filters, protocol analysis, and real-world scena…

Apr 21, 2026
Kali Linux Commands for Pentesters & Bug Bounty Hunters
New

Kali Linux Commands for Pentesters & Bug Bounty Hunters

Master essential Kali Linux commands for penetration testing, bug bounty hunting, and red teaming. Practical examples, powerful tools, and expert tips for security professionals.

Apr 20, 2026
SQL Injection Explained: A Deep Dive for Pentesters & Bug Bounty Hunters
New

SQL Injection Explained: A Deep Dive for Pentesters & Bug Bounty Hunters

Uncover the dangers of SQL Injection. This practical guide for pentesters, red teamers, and bug bounty hunters breaks down common types, real-world attacks, and detection techni…

Apr 19, 2026
Welcome to our blog.
Archive

Welcome to our blog.

Welcome to our blog.

2017
Multiple Stored XSS and HTML Injection in...
Archive

Multiple Stored XSS and HTML Injection in...

Title: Multiple Stored XSS and HTML Injection in Edueto. Found by: Skelor

2017
RCE In AddThis
Archive

RCE In AddThis

This vulnerability has been fixed as of July 20, 2016 and is shared with consent from the vendor. If you wish to share the information provided in the write up, provide credit f…

2017
PornHub: Email Confirmation Bypass
Archive

PornHub: Email Confirmation Bypass

Reporter : Vaxo Dai (@___0x00) After signing up client needs to verify his email address to further use but the confirmation can be bypassed and can put any email address to con…

2017
Reading Uber’s Internal Emails [Uber Bug Bounty report worth $10,000]
Archive

Reading Uber’s Internal Emails [Uber Bug Bounty report worth $10,000]

After recent finding about one of the Uber’s subdomain takeover was publicly disclosed, I looked into Uber to find similar bugs. One of my colleagues Abhibandu Kafle, pointed ou…

2017
How I snooped into your private Slack messages [Slack Bug bounty worth $2,500]
Archive

How I snooped into your private Slack messages [Slack Bug bounty worth $2,500]

When researching about MX records of slack.com, I noticed that they used a 3rd party email service. In that service, however slack.com was already claimed. After a little more r…

2017
Bypassing Ebay XSS Protection to launch XSS by Nirmal Dahal
Archive

Bypassing Ebay XSS Protection to launch XSS by Nirmal Dahal

This is a small proof of concept regarding “Reflective Cross-Site Scripting [ R-XSS ]” which I had found on Ebay. I am not an active participant in bug bounty programs, but one …

2017
I got emails - G Suite Vulnerability
Archive

I got emails - G Suite Vulnerability

After recent finding about Uber and SendGrid bug, I decided to check other third party applications that were also used for similar cases. During the investigation, some third p…

2017
This domain is my domain - G Suite A record vulnerability
Archive

This domain is my domain - G Suite A record vulnerability

In part two of G Suite vulnerability discussion, I am writing about a simple but quite serious vulnerability in yet another part of G Suite Application. In general, G Suite is a…

2017