<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Dedsec</title><link>https://dedsec-2.github.io/</link><description>Recent content on Dedsec</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sat, 09 May 2026 14:00:00 +0200</lastBuildDate><atom:link href="https://dedsec-2.github.io/index.xml" rel="self" type="application/rss+xml"/><item><title>Breaking In Without a Key: Chaining Client-Side Auth Into Stored HTML Injection</title><link>https://dedsec-2.github.io/posts/client-side-auth-bypass-injection-chain/</link><pubDate>Sat, 09 May 2026 14:00:00 +0200</pubDate><guid>https://dedsec-2.github.io/posts/client-side-auth-bypass-injection-chain/</guid><description>&lt;h2 id="-intro">$ ./intro&lt;/h2>
&lt;p>Some targets look locked down at first glance. Login page, redirect on every protected URL, role-gated sections marked &amp;ldquo;Not Authorized.&amp;rdquo; You open Burp, run a few requests, and think &lt;em>&amp;ldquo;this is going to be a long day.&amp;rdquo;&lt;/em>&lt;/p>
&lt;p>Then you notice that none of the HTTP responses ever return a &lt;code>302&lt;/code>. And your whole afternoon changes.&lt;/p>
&lt;p>This is a writeup of a web application penetration test against an internal manufacturing dashboard — a platform used by engineers, factory leads, and regional teams to track production data, file technical issues, and manage order queues. The application had a multi-role access model with pages supposedly gated behind authorization checks. What it did not have was any of those checks running on the server.&lt;/p></description></item><item><title>Welcome to Dedsec</title><link>https://dedsec-2.github.io/posts/welcome/</link><pubDate>Sat, 09 May 2026 10:00:00 +0200</pubDate><guid>https://dedsec-2.github.io/posts/welcome/</guid><description>&lt;h2 id="-init">$ ./init&lt;/h2>
&lt;p>This blog will document offensive security engagements, techniques, and research.&lt;/p>
&lt;p>Topics covered:&lt;/p>
&lt;ul>
&lt;li>Web &amp;amp; API penetration testing&lt;/li>
&lt;li>Active Directory exploitation&lt;/li>
&lt;li>Red team operations&lt;/li>
&lt;li>Mobile security&lt;/li>
&lt;li>Exploit development&lt;/li>
&lt;/ul>
&lt;p>Stay tuned.&lt;/p></description></item><item><title>whoami</title><link>https://dedsec-2.github.io/about/</link><pubDate>Sat, 09 May 2026 00:00:00 +0000</pubDate><guid>https://dedsec-2.github.io/about/</guid><description>&lt;img src="https://dedsec-2.github.io/img/avatar.jpg" alt="Dedsec" style="width:220px; float:right; margin:0 0 1rem 2rem; border:none !important; padding:0 !important; background:transparent !important;" />
&lt;h2 id="-about">$ ./about&lt;/h2>
&lt;p>Senior Offensive Security Consultant based in Egypt, focused on adversarial simulation and offensive research.&lt;/p>
&lt;p>This blog documents engagements, techniques, and research from real-world penetration testing — primarily web, API, Active Directory, and red team operations, with ongoing work in reverse engineering and exploit development.&lt;/p>
&lt;h2 id="-focus">$ ./focus&lt;/h2>
&lt;ul>
&lt;li>&lt;strong>Web &amp;amp; API Security&lt;/strong> — application logic flaws, authentication and authorization bypasses, injection chains&lt;/li>
&lt;li>&lt;strong>Active Directory &amp;amp; Red Teaming&lt;/strong> — full kill chain operations, credential access, lateral movement, privilege escalation&lt;/li>
&lt;li>&lt;strong>Mobile Security&lt;/strong> — Android dynamic analysis, static analysis, runtime instrumentation&lt;/li>
&lt;li>&lt;strong>Reverse Engineering &amp;amp; Exploit Development&lt;/strong> — currently advancing through Ret2 Systems&amp;rsquo; Software Exploitation curriculum&lt;/li>
&lt;/ul>
&lt;h2>$ ./certifications&lt;/h2>
&lt;div style="display: grid; grid-template-columns: repeat(auto-fit, minmax(280px, 1fr)); gap: 0.75rem; margin: 1.5rem 0;">
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem; background: #000;">&lt;strong style="color: var(--accent);">OSCP&lt;/strong>&lt;br/>&lt;small>Offensive Security Certified Professional&lt;/small>&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem; background: #000;">&lt;strong style="color: var(--accent);">CRTO&lt;/strong>&lt;br/>&lt;small>Certified Red Team Operator&lt;/small>&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem; background: #000;">&lt;strong style="color: var(--accent);">CRTP&lt;/strong>&lt;br/>&lt;small>Certified Red Team Professional&lt;/small>&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem; background: #000;">&lt;strong style="color: var(--accent);">HTB CPTS&lt;/strong>&lt;br/>&lt;small>Hack The Box Certified Penetration Testing Specialist&lt;/small>&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem; background: #000;">&lt;strong style="color: var(--accent);">CAPen&lt;/strong>&lt;br/>&lt;small>Certified AppSec Pentester · SecOps Group&lt;/small>&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem; background: #000;">&lt;strong style="color: var(--accent);">CNPen&lt;/strong>&lt;br/>&lt;small>Certified Network Pentester · SecOps Group&lt;/small>&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem; background: #000;">&lt;strong style="color: var(--accent);">eCPPTv2&lt;/strong>&lt;br/>&lt;small>eLearnSecurity Certified Professional Penetration Tester&lt;/small>&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem; background: #000;">&lt;strong style="color: var(--accent);">PT1&lt;/strong>&lt;br/>&lt;small>TryHackMe Penetration Tester I&lt;/small>&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem; background: #000;">&lt;strong style="color: var(--accent);">RastaLabs&lt;/strong>&lt;br/>&lt;small>Hack The Box ProLab&lt;/small>&lt;/div>
&lt;/div>
&lt;h2>$ ./domains&lt;/h2>
&lt;div style="display: grid; grid-template-columns: repeat(auto-fit, minmax(280px, 1fr)); gap: 0.75rem; margin: 1.5rem 0;">
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">Web Application Pentesting&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>OWASP Top 10&lt;/li>
&lt;li>Business logic flaws&lt;/li>
&lt;li>Authentication bypasses&lt;/li>
&lt;li>Injection chains (SQLi, SSTI, SSRF)&lt;/li>
&lt;li>Access control flaws&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">API Pentesting&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>REST and GraphQL testing&lt;/li>
&lt;li>BOLA / IDOR exploitation&lt;/li>
&lt;li>Mass assignment&lt;/li>
&lt;li>JWT abuse&lt;/li>
&lt;li>Rate limiting bypass&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">Active Directory &amp; Red Teaming&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>Full kill chain operations&lt;/li>
&lt;li>Kerberos attacks (Kerberoasting, ASREP)&lt;/li>
&lt;li>NTDS.dit extraction&lt;/li>
&lt;li>Lateral movement and pivoting&lt;/li>
&lt;li>Cross-forest compromise&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">Network Pentesting&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>Internal infrastructure assessment&lt;/li>
&lt;li>External perimeter testing&lt;/li>
&lt;li>Service exploitation&lt;/li>
&lt;li>SMB and LDAP abuse&lt;/li>
&lt;li>Post-exploitation enumeration&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">Mobile Pentesting&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>Android dynamic analysis with Frida&lt;/li>
&lt;li>Static analysis with Jadx and MobSF&lt;/li>
&lt;li>Runtime instrumentation&lt;/li>
&lt;li>IPC and intent abuse&lt;/li>
&lt;li>Root detection bypass&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">Source Code Review&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>White-box web app assessment&lt;/li>
&lt;li>API source review&lt;/li>
&lt;li>Java, .NET, PHP, Node.js&lt;/li>
&lt;li>Secure coding evaluation&lt;/li>
&lt;li>SAST integration&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">Desktop Application Pentesting&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>Thick-client testing&lt;/li>
&lt;li>.NET reverse engineering&lt;/li>
&lt;li>Local privilege escalation&lt;/li>
&lt;li>Insecure deserialization&lt;/li>
&lt;li>IPC and DLL hijacking&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">Reverse Engineering&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>Binary analysis (Ghidra, IDA)&lt;/li>
&lt;li>.NET decompilation (dnSpy)&lt;/li>
&lt;li>Malware analysis basics&lt;/li>
&lt;li>Protocol reverse engineering&lt;/li>
&lt;li>Anti-debugging bypass&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">Exploit Development&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>Stack and heap overflows&lt;/li>
&lt;li>ROP chain construction&lt;/li>
&lt;li>Modern mitigation bypass&lt;/li>
&lt;li>Ret2 Systems curriculum&lt;/li>
&lt;li>Userland exploitation&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">Phishing &amp; Social Engineering&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>Adversarial campaigns&lt;/li>
&lt;li>Evilginx credential harvesting&lt;/li>
&lt;li>Multi-stage payload delivery&lt;/li>
&lt;li>Awareness assessments&lt;/li>
&lt;li>Pretext development&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">Configuration Reviews&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>Firewall rule auditing&lt;/li>
&lt;li>Router and switch hardening&lt;/li>
&lt;li>Enterprise security solutions&lt;/li>
&lt;li>CIS benchmarks&lt;/li>
&lt;li>Network segmentation review&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div style="border: 1px solid var(--accent); padding: 0.75rem 1rem;">
&lt;strong style="color: var(--accent);">Vulnerability Assessment&lt;/strong>
&lt;ul style="margin: 0.5rem 0 0 1rem; padding: 0;">
&lt;li>Tenable Nessus scans&lt;/li>
&lt;li>Nmap and service enumeration&lt;/li>
&lt;li>Manual validation&lt;/li>
&lt;li>Risk prioritization&lt;/li>
&lt;li>Remediation guidance&lt;/li>
&lt;/ul>
&lt;/div>
&lt;/div>
&lt;h2 id="-experience">$ ./experience&lt;/h2>
&lt;ul>
&lt;li>&lt;strong>Senior Offensive Security Consultant&lt;/strong> — CyberTeq · Jun 2025 – Present&lt;/li>
&lt;li>&lt;strong>Offensive Security Engineer&lt;/strong> — EFG Holding · Jan 2024 – May 2025&lt;/li>
&lt;li>&lt;strong>Cyber Security Researcher&lt;/strong> — Resecurity · 2023&lt;/li>
&lt;li>&lt;strong>Penetration Tester&lt;/strong> — DOMINFOSEC SOLUTIONS LLP · 2023&lt;/li>
&lt;/ul>
&lt;h2 id="-contact">$ ./contact&lt;/h2>
&lt;ul>
&lt;li>GitHub: &lt;a href="https://github.com/DEDSEC-2">DEDSEC-2&lt;/a>&lt;/li>
&lt;li>LinkedIn: &lt;a href="https://linkedin.com/in/d3d53c/">Momen Mahmoud&lt;/a>&lt;/li>
&lt;li>Email: momenmahmoud478 [at] gmail [dot] com&lt;/li>
&lt;/ul>
&lt;hr>
&lt;p>&lt;em>Currently exploring exploit development and offensive AI research. Open to collaboration on offensive security writeups and tooling.&lt;/em>&lt;/p></description></item></channel></rss>