Hacked & Secured: Pentest Exploits & Mitigations

Amin Malekpour

If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, developer, or blue teamer, you'll gain actionable insights to apply in your work. 🎧 New episodes every month. 🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram, Website Link 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A    📧 Feedback? Email Us → podcast@quailu.com.au

Avsnitt

  1. 24 JULI

    Ep. 11 – Account Takeover, Token Misuse, and Deserialization RCE: When Trust Goes Wrong

    One flawed password reset. One shared session token. One dangerous object. In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences. Account Takeover via Forgot Password – A predictable ID and exposed tokens let attackers reset passwords without access to email.Session Hijack in OTP Login – A logic flaw in how login tokens were handled allowed full account access with just a user ID.Remote Code Execution via Java Deserialization – A community-contributed finding where an exposed service deserialized untrusted input, leading to code execution.These aren’t complex chains. They’re common mistakes with big impact—and important lessons for developers, security teams, and testers. Chapters: 00:00 - INTRO 00:59 - FINDING #1 - Account Takeover via Forgot Password 06:26 - FINDING #2 - Shared Session Token in SMS Login Flow 10:39 - FINDING #3 - Java Deserialisation to Remote Code Execution 16:13 - OUTRO Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode! 🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A 📧 Feedback? Email Us → podcast@quailu.com.au 🔗 Podcast Website → Website Link

    17 min
  2. 13 FEB.

    Ep. 3 – One Request, One URL, One Bluetooth Hack: Three Takeovers That Shouldn’t Have Happened

    How can attackers take over accounts, networks, and devices—without credentials? In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough: Account Takeover – A single request bypassed email verification, locking out store owners.Internal Network Compromise – A hidden admin URL and hardcoded access key gave attackers full control.Smart Device Hijack – A community-submitted finding reveals how Bluetooth vulnerabilities allowed remote command execution—without WiFi, passwords, or internet access.These findings expose critical weaknesses in application security, network defense, and IoT device protection—problems that pentesters, developers, and security teams must identify before attackers do. Chapters: 00:00 - INTRO 01:30 - FINDING #1 - How a Security Researcher Took Over an Entire Shopping Platform with Just One Request 07:25 - FINDING #2 - How a Security Researcher Hacked an Entire Internal Network with Just One URL 13:46 - FINDING #3 - How a Security Researcher Took Over a Smart Switch Using Just Bluetooth 20:47 - OUTRO Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode! 🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A 📧 Feedback? Email Us → podcast@quailu.com.au 🔗 Podcast Website → Website Link

    22 min
  3. 30 JAN.

    Ep. 2 – Chaining IDORs, CSRF Account Takeovers & Token Manipulation for Privilege Escalation

    What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges? In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world pentest findings that prove creative exploitation turns small flaws into critical security risks: Chaining IDORs for account takeover – Exploiting weak access controls.CSRF bypass to reset security questions – Turning one click into total compromise.Privilege escalation via token manipulation – How a simple change led to admin access.Learn how these vulnerabilities were discovered, exploited, and mitigated. Chapters: 00:00 - INTRO 01:02 - FINDING #1 - Account Takeover by Chaining Two IDORs 07:19 - FINDING #2 - Account Takeover Through CSRF Vulnerability in Security Questions 12:18 - FINDING #3 - Privilege Escalation Through Authorization Token Manipulation 17:05 - OUTRO Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode! 🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A 📧 Feedback? Email Us → podcast@quailu.com.au 🔗 Podcast Website → Website Link

    19 min
  4. 30 JAN.

    Ep. 1 – Breaking OTP Security, Exploiting Static Domains & Privilege Escalation via Role Misconfigurations

    What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges? In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world security failures that turned minor oversights into critical exploits: Leaking OTPs in API responses – Breaking authentication at the source.Static domain to account takeover – When persistence turns into a full exploit.Privilege escalation via role mismanagement – How attackers bypass access controls.Learn how these vulnerabilities were discovered, exploited, and mitigated. Chapters: 00:00 - INTRO 01:00 - FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses 05:20 - FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence 12:05 - FINDING #3 - Privilege Escalation via User Invitations and Role Assignment 16:49 - OUTRO Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode! 🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A 📧 Feedback? Email Us → podcast@quailu.com.au 🔗 Podcast Website → Website Link

    19 min

Om

If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, developer, or blue teamer, you'll gain actionable insights to apply in your work. 🎧 New episodes every month. 🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram, Website Link 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A    📧 Feedback? Email Us → podcast@quailu.com.au