<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://sh2rwx.github.io/</id><title>Shervoni</title><subtitle>Blog, CTFs, Write ups, Projects</subtitle> <updated>2026-01-02T10:08:50+00:00</updated> <author> <name>Shervoni</name> <uri>https://sh2rwx.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://sh2rwx.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://sh2rwx.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Shervoni </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>TCM SOC 101 - Notes</title><link href="https://sh2rwx.github.io/posts/TCM-SOC-101-Notes/" rel="alternate" type="text/html" title="TCM SOC 101 - Notes" /><published>2024-12-20T00:00:00+00:00</published> <updated>2024-12-20T00:00:00+00:00</updated> <id>https://sh2rwx.github.io/posts/TCM-SOC-101-Notes/</id> <content type="text/html" src="https://sh2rwx.github.io/posts/TCM-SOC-101-Notes/" /> <author> <name>Shervoni</name> </author> <category term="Courses" /> <category term="TCM 101" /> <summary>Part 1 - SOC Fundamentals Context: This section covers the foundational concepts of Security Operations Centers (SOCs). Understanding these basics is essential for anyone entering cybersecurity operations, as it explains how organizations centralize their security monitoring and response capabilities. SOC (Security Operations Center) - A centralized unit that monitors, detects, and responds to...</summary> </entry> <entry><title>Access Control Vulnerabilities</title><link href="https://sh2rwx.github.io/posts/access-control-vulnerabilities/" rel="alternate" type="text/html" title="Access Control Vulnerabilities" /><published>2024-12-05T00:00:00+00:00</published> <updated>2024-12-07T16:21:28+00:00</updated> <id>https://sh2rwx.github.io/posts/access-control-vulnerabilities/</id> <content type="text/html" src="https://sh2rwx.github.io/posts/access-control-vulnerabilities/" /> <author> <name>Shervoni</name> </author> <category term="Web Security" /> <summary>Understanding Access Control Vulnerabilities Access control vulnerabilities occur when a web application fails to enforce proper restrictions on user actions or resources. This enables attackers to escalate privileges, access unauthorized data, or misuse sensitive functionality. These flaws are often critical and easy to exploit, making them a high-priority focus in security assessments. Vert...</summary> </entry> <entry><title>Access Control Cheatsheet</title><link href="https://sh2rwx.github.io/posts/access-control-vulnerabilities-cheatsheet/" rel="alternate" type="text/html" title="Access Control Cheatsheet" /><published>2024-12-05T00:00:00+00:00</published> <updated>2025-12-13T07:06:06+00:00</updated> <id>https://sh2rwx.github.io/posts/access-control-vulnerabilities-cheatsheet/</id> <content type="text/html" src="https://sh2rwx.github.io/posts/access-control-vulnerabilities-cheatsheet/" /> <author> <name>Shervoni</name> </author> <category term="Cheatsheets" /> <summary>Access Control Vulnerabilities Summary and Testing Guide What Are Access Control Vulnerabilities? Access control vulnerabilities occur when an application does not properly restrict users’ access to actions or data. This allows unauthorized users to: Perform admin-only functions (vertical privilege escalation). Access other users’ data or resources (horizontal privilege escalation). Exp...</summary> </entry> <entry><title>Information Disclosure Vulnerabilities</title><link href="https://sh2rwx.github.io/posts/information-disclosure/" rel="alternate" type="text/html" title="Information Disclosure Vulnerabilities" /><published>2024-11-19T00:00:00+00:00</published> <updated>2024-11-19T00:00:00+00:00</updated> <id>https://sh2rwx.github.io/posts/information-disclosure/</id> <content type="text/html" src="https://sh2rwx.github.io/posts/information-disclosure/" /> <author> <name>Shervoni</name> </author> <category term="Web Security" /> <summary>What is Information Disclosure? Information disclosure, also known as information leakage, occurs when a website unintentionally reveals sensitive information to its users. Depending on the context, websites may leak all kinds of information to a potential attacker, including: Data about other users, such as usernames or financial information Sensitive commercial or business data Techn...</summary> </entry> <entry><title>Path Traversal Vulnerabilities: Cheatsheet</title><link href="https://sh2rwx.github.io/posts/path-traversal-vulnerabilitys-cheatsheet/" rel="alternate" type="text/html" title="Path Traversal Vulnerabilities: Cheatsheet" /><published>2024-11-15T00:00:00+00:00</published> <updated>2025-12-13T07:06:23+00:00</updated> <id>https://sh2rwx.github.io/posts/path-traversal-vulnerabilitys-cheatsheet/</id> <content type="text/html" src="https://sh2rwx.github.io/posts/path-traversal-vulnerabilitys-cheatsheet/" /> <author> <name>Shervoni</name> </author> <category term="Cheatsheets" /> <summary>When testing for path traversal vulnerabilities, look for every potential entry points. Path Traversal Testing Cheatsheet Check for endpoints with file operations (e.g., load, file, path, image, download). Test common file parameters like file=, path=, dir=, image=. Modify URL paths to include traversal sequences (e.g., ../, ..\, ../../file.txt). Test static resources or templates (e...</summary> </entry> </feed>
