<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Ethical Hacking on nstsec.com</title>
    <link>https://nstsec.com/en/tags/ethical-hacking/</link>
    <description>Recent content in Ethical Hacking on nstsec.com</description>
    <image>
      <title>nstsec.com</title>
      <url>https://nstsec.com/images/index.png</url>
      <link>https://nstsec.com/images/index.png</link>
    </image>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Thu, 16 Apr 2026 18:30:00 +0200</lastBuildDate>
    <atom:link href="https://nstsec.com/en/tags/ethical-hacking/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE-2026-40487: Arbitrary File Upload &gt; Stored XSS &gt; Account Takeover in Postiz</title>
      <link>https://nstsec.com/en/posts/postiz-xss-cve-2026-40487/</link>
      <pubDate>Thu, 16 Apr 2026 18:30:00 +0200</pubDate>
      <guid>https://nstsec.com/en/posts/postiz-xss-cve-2026-40487/</guid>
      <description>How I discovered an Arbitrary File Upload in Postiz (CVE-2026-40487, CVSS 8.9 High) that allows full account takeover.</description>
    </item>
    <item>
      <title>OSWE: White-Box Hacking</title>
      <link>https://nstsec.com/en/posts/oswe-awae-prep/</link>
      <pubDate>Thu, 13 Nov 2025 22:03:59 +0200</pubDate>
      <guid>https://nstsec.com/en/posts/oswe-awae-prep/</guid>
      <description>Resources, labs, case studies and practical tips to prepare for the OSWE (OffSec Web Expert) exam and the AWAE (WEB-300) course.</description>
    </item>
    <item>
      <title>Bug Hunting NASA</title>
      <link>https://nstsec.com/en/posts/nasa-letter-of-recognition/</link>
      <pubDate>Wed, 02 Apr 2025 12:45:00 +0000</pubDate>
      <guid>https://nstsec.com/en/posts/nasa-letter-of-recognition/</guid>
      <description>Letter of recognition from NASA</description>
    </item>
    <item>
      <title>OSCP Cheatsheets</title>
      <link>https://nstsec.com/en/posts/my-oscp-cheatsheets/</link>
      <pubDate>Wed, 10 May 2023 11:40:24 +0200</pubDate>
      <guid>https://nstsec.com/en/posts/my-oscp-cheatsheets/</guid>
      <description>Notes and essential commands for OSCP. Techniques, exploits, and strategies for exam success.</description>
    </item>
    <item>
      <title>CVE-2022-44023</title>
      <link>https://nstsec.com/en/posts/pwndoc-username-enumeration-cve-2022-44023/</link>
      <pubDate>Sat, 29 Oct 2022 10:45:00 +0200</pubDate>
      <guid>https://nstsec.com/en/posts/pwndoc-username-enumeration-cve-2022-44023/</guid>
      <description>PwnDoc &amp;lt;= 0.5.3 - Username Enumeration via Different Responses</description>
    </item>
    <item>
      <title>CVE-2022-44022</title>
      <link>https://nstsec.com/en/posts/pwndoc-username-enumeration-cve-2022-44022/</link>
      <pubDate>Sat, 29 Oct 2022 10:23:19 +0200</pubDate>
      <guid>https://nstsec.com/en/posts/pwndoc-username-enumeration-cve-2022-44022/</guid>
      <description>PwnDoc &amp;lt;= 0.5.3 - Username Enumeration via Response Timings</description>
    </item>
    <item>
      <title>CVE-2020-13654 - My First CVE: XSS &gt; CSRF &gt; Privesc to ADMIN</title>
      <link>https://nstsec.com/en/posts/xwiki-xss-cve-2020-13654/</link>
      <pubDate>Wed, 30 Dec 2020 11:19:29 +0200</pubDate>
      <guid>https://nstsec.com/en/posts/xwiki-xss-cve-2020-13654/</guid>
      <description>How I discovered a Stored XSS in XWiki Platform &amp;lt; 12.8, why the HttpOnly flag prevented cookie theft, and how I had to pivot the attack toward a privilege escalation via CSRF, ultimately earning my first CVE from MITRE.</description>
    </item>
  </channel>
</rss>
