Skip to content
  • Home
  • Blog
  • About
infosecc Making information security cool!
infosecc Making information security cool!
  • Home
  • Blog
  • About
Blog

Broken Link Hijacking

In the vast world of web vulnerabilities, Broken Link Hijacking (BLH) is a subtle yet potent risk that...
Pralaynath GundaswamyJan 25, 2026Jan 25, 2026
Blog

Bypassing proxy server on corporate network!

The DiscoveryBack in 2017, I was poking around a corporate network’s defenses and stumbled upon a gap that...
Pralaynath GundaswamyJan 25, 2026Jan 25, 2026

Top pick for you

Blog

Broken Link Hijacking

Pralaynath GundaswamyJan 25, 2026Jan 25, 2026
Blog

Bypassing proxy server on corporate network!

Pralaynath GundaswamyJan 25, 2026Jan 25, 2026

You may also like

Blog

Broken Link Hijacking

In the vast world of web vulnerabilities, Broken Link Hijacking (BLH) is a subtle yet potent risk that...
Pralaynath GundaswamyJan 25, 2026Jan 25, 2026
Blog

Bypassing proxy server on corporate network!

The DiscoveryBack in 2017, I was poking around a corporate network’s defenses and stumbled upon a gap that...
Pralaynath GundaswamyJan 25, 2026Jan 25, 2026
Blog

Broken Link Hijacking

Pralaynath GundaswamyJan 25, 2026Jan 25, 2026
Blog

Bypassing proxy server on corporate network!

Pralaynath GundaswamyJan 25, 2026Jan 25, 2026
Blog

Broken Link Hijacking

Pralaynath GundaswamyJan 25, 2026Jan 25, 2026
Blog

Bypassing proxy server on corporate network!

Pralaynath GundaswamyJan 25, 2026Jan 25, 2026

Home

Dec 13, 2025Dec 13, 2025