Posts

Featured Post

Hands-on with n8n Expression Injection - CVE 2025-68613

Image
Hands-on with n8n Expression Injection – Sandbox Escape Case Study In this lab, I analyzed a critical expression injection flaw in n8n that allows authenticated workflow expressions to escape sandbox isolation and access the underlying Node.js runtime, resulting in potential Remote Code Execution (RCE) . Understanding the Execution Model n8n allows users to embed expressions inside workflow nodes (Set, IF, HTTP Request, etc.) to compute dynamic values at runtime. These expressions are evaluated server-side by a Node.js-based engine. When sandboxing assumptions fail, the execution flow becomes: Authenticated user → Workflow expression → Expression evaluation engine → Node.js runtime objects (process, require) → Sandbox escape → Potential RCE --- Architecture Overview High-Level Architecture User Browser n8n Web UI Expression Engine Node.js Runtime Understanding Payload St...
Image
Securing AI: Safeguarding the Future of Intelligent Systems Featured Image: Unsplash Artificial Intelligence (AI) is revolutionizing industries, from healthcare to finance, by enabling automation, personalization, and data-driven decision-making. However, as AI systems grow more pervasive, their security vulnerabilities are becoming a critical concern. 📊 Quick Stat : By 2025, 30% of enterprises will prioritize AI-specific security tools to combat adversarial attacks ( Gartner ). Why AI Security Matters Source: Getty Images AI systems are not just code; they’re dynamic entities trained on vast datasets. Their security is critical because: High Stakes : AI powers autonomous vehicles, medical diagnostics, and critical inf...

The Transformative Role of AI in Cybersecurity: Opportunities, Challenges, and the Road Ahead

  Introduction In an era where cyberattacks cost the global economy an estimated $10.5 trillion annually by 2025 (Cybersecurity Ventures), businesses and individuals alike are racing to fortify their defenses. Traditional security measures, reliant on rule-based systems and human oversight, struggle to keep pace with sophisticated threats. Enter Artificial Intelligence (AI)—a game-changer that’s reshaping cybersecurity by enabling faster, smarter, and proactive defense mechanisms. This blog explores how AI is revolutionizing the field, the challenges it faces, and what the future holds. The Role of AI in Cybersecurity Threat Detection and Prevention AI excels at analyzing vast datasets to identify anomalies. Machine Learning (ML) models, trained on historical attack data, can detect subtle patterns in network traffic, flagging zero-day exploits or ransomware before they cause harm. For example, Darktrace’s AI system uses behavioral analysis to spot deviations in user activity, thwa...

Useful Tips and Tricks for Web Pentesting

Generating Custom SSRF Payloads https://tools.intigriti.io/redirector/# How to do it 1. Go to Intigriti payload generator → https://tools.intigriti.io/redirector/# 2. Enter the target domain (it can be anything) 3. Enter your own collaborator URL 4. Submit 5. Download the .txt file and use it as part of intruder This will generate an SSRF payload list that: • Contains your collaborator URL • Applies encoding on your collaborator URL to bypass filters   Injecting Payloads in Email Address Fields test+(<script>alert(0)</script>)@example.com test@example(<script>alert(0)</script>).com "<script>alert(0)</script>"@example.com "<%=7*7%>"@example.com test+(${{7*7}})@example.com "'OR1=1--'"@example.com user@test.burpcollaborator.net user@[127.0.0.1] user@email=attacker@example.com %0d%0aContent-Length:%200%0d%0a%0d%0a"@example.com "recipient@test.com\r\nRCPT TO:<victim+"@test.com For...

SAML Security Test Cases

Signature Exclusion Attack -Test whether or not the SP accepts an Assertion without a Signature  Signature Spoofing attack -Test whether SP accepts fake signature or using previously generated/invalid signature Signature Wrapping Attack (8 Different Ways)-Test whether or not the SP is susceptible to Signature Wrapping XML Injection -Test if can inject malicious code into the SAML response from IDP, allowing them to execute arbitrary code on the SP server. XML Entity Expansion (XEE)/XXE -Test whether or not the SP is vulnerable to XML External Entities Replay attacks -Test if previously generated SAML response from IDP can be accepted by SP Certificate Faking/Self signed certificate -Test whether or not the SP verifies that the Assertion came from a trusted IDP/Test if SP accepts self-signed certificate XSLT Injection -Test whether or not the SP is vulnerable to XSLT Predictable signature -Test whether IDP generating guessable signature SAML message expiration -Test whether SP acc...

File Upload Security Testing Checklists

  Security Checklist Are filenames reflected back on the page? If so, are they HTML Entity encoded (XSS via file names)? Does it accept .zip files? Try a  ZipSlip If it processes an image, check for  Image Tragick (CVE-2016-3714) Can you bypass file type restrictions by changing the content-type value? Can you bypass file type restrictions by  forging valid magic bytes ? Can you upload a file with a less-common extension (such as .phtml)? Try playing with the filename in the request, a potential vector for traversal or SQL injection. Check for the acceptance of double extensions on uploaded files. Test for  null-byte injection . Is the server windows? Try adding a  trailing  .  to bypass extension blacklists , this dot will be removed automatically by the OS. Can you upload an  SVG for XSS ? If supported by the webserver, can you  upload .htaccess files ? Does the backend process the image with the  PHP GD library ? Is the app vulne...

JWT security test cases

Image