Bypassing OAuth 2.0 via State-Parameter Pollution
Exploring a novel technique to compromise account security through malicious state injection in popular SSO providers.
Elite Cyber Security Researcher & Offensive Specialist. Deciphering complex architectures to fortify the digital frontier. Specializing in Bug Bounty, VAPT, and Deep System Audits.
With over 5 years of focused experience in offensive security, I bridge the gap between architectural theory and practical exploitability. My journey began in the underground CTF communities, evolving into a professional career protecting critical infrastructure.
I specialize in identifying high-impact vulnerabilities that automated scanners miss. My methodology combines exhaustive manual analysis with custom-built exploitation scripts to ensure every vector is accounted for.
Core Proficiencies & Specializations
Advanced exploitation of OWASP Top 10, complex IDORs, and race conditions.
Specialized auditing for REST, GraphQL, and SOAP architectures.
Internal and external perimeter assessment and lateral movement analysis.
Precision testing methodologies designed to uncover critical vulnerabilities before they are exploited by malicious actors.
Comprehensive scanning and validation of your digital assets to identify potential weaknesses in configurations or software versions.
Deep-dive manual exploitation to simulate real-world attacks. We don't just find holes; we demonstrate the impact.
Exploring a novel technique to compromise account security through malicious state injection in popular SSO providers.
How introspection and poorly filtered schemas led to the leak of 50k+ user profiles on a major fintech platform.
A case study on why development tools should never be exposed without multi-factor authentication and strict IP whitelisting.
Whether you need a full-scale audit or want to consult on an upcoming release, I am ready to deploy. Reach out for availability.