Homepage
Open in app
Sign in
Get started
Shahmeer Amir
| Bug Bounty Hunter| Hack-o-prenuer | Researcher | Speaker | Ironmaniac | Building the next arc reactor near you | “Hacker”
About me
Publications
Achievements
News
Contact
Follow
Following
Securing your Infrastructure using Crowdsourced Security
Securing your Infrastructure using Crowdsourced Security
Bug Bounty hunting is a crowdsourced cyber security model that helps companies utilize the power of the crowd to secure their…
Shahmeer Amir
Jan 28, 2023
6 Methods to bypass CSRF protection on a web application
6 Methods to bypass CSRF protection on a web application
This article contains some of common ways to bypass CSRF protection in web applications that you can use as bug bounty hunter
Shahmeer Amir
May 16, 2019
The Rock Bottom Theory of a Bug Bounty hunter
The Rock Bottom Theory of a Bug Bounty hunter
The story of a bug bounty hunter from start to finish
Shahmeer Amir
Mar 17, 2017
Injecting a 7500$ worth database
Injecting a 7500$ worth database
Greetings to all those reading this article
Shahmeer Amir
Oct 11, 2017
Introducing “Gujjar” The bot responsible for Bitcoin price fluctuation in Coinbase
Introducing “Gujjar” The bot responsible for Bitcoin price fluctuat...
It has been sometime since i posted an article on my blog, it’s because i am juggling a lot of things right now. Foremost of all of them is…
Shahmeer Amir
Dec 30, 2017
Traversing the path to 5000$ in Help
Traversing the path to 5000$ in Help
Hello readers,
Shahmeer Amir
Jun 25, 2017
How i Hacked into AirBnB in three simple steps
How i Hacked into AirBnB in three simple steps
Hello to all readers,
Shahmeer Amir
Feb 24, 2018
Apache Directory Studio Command Injection
Apache Directory Studio Command Injection
Apache Directory Studio is a Desktop application which basically is used as an LDAP tooling platform for the LDAP server which was…
Shahmeer Amir
Apr 14, 2017
4 Methods to Bypass two factor Authentication
4 Methods to Bypass two factor Authentication
Since the dawn of the World Wide Web, attackers have been involved in discovering techniques to compromise systems. Likewise security…
Shahmeer Amir
Jul 15, 2017
Stealing Windows Credentials Using Google Chrome
Stealing Windows Credentials Using Google Chrome
Attacks that leak authentication credentials using the SMB file sharing protocol on Windows OS are an ever-present issue, exploited in…
Shahmeer Amir
May 23, 2017
Android apps User Impersonation in Periscope app
Android apps User Impersonation in Periscope app
In this write-up i will showing you a logical issue which leaves most android apps vulnerable to identity theft and user impersonation…
Shahmeer Amir
Apr 15, 2017
5 Things You Need To Teach Your Staff About Cyber Security
5 Things You Need To Teach Your Staff About Cyber Security
Your employees play a key role in ensuring the security of your computers and networks, because they are the people using them every day…
Shahmeer Amir
Jul 19, 2017
5 methods Ladies can use to protect their online information from being misused
5 methods Ladies can use to protect their online information from b...
Usually the articles that i do are technical and not understandable to everyone, but i have been alot of requests on my page and emails…
Shahmeer Amir
Jul 21, 2017
Penetration Testing of an FTP Server
Penetration Testing of an FTP Server
Welcome to Internal penetration testing on FTP server where you will learn FTP installation and configuration, enumeration and attack…
Shahmeer Amir
Sep 15, 2017
Harvesting Admin credentials of TP-Link Router
Harvesting Admin credentials of TP-Link Router
Some bugs are very strange and dangerous, this is the case of a flaw affecting the TP-Link’s M5350 3G/Wi-Fi router that can expose admin…
Shahmeer Amir
May 21, 2017
Blockchain, The Solution for Corruption in Pakistan
Blockchain, The Solution for Corruption in Pakistan
Block Tech is here to stay and we all know it. The real question is that “Is it going to intervene in every part of our lives?
Shahmeer Amir
Oct 20, 2017
How Quantum Computers would destroy Internet Security
How Quantum Computers would destroy Internet Security
If all the world had were water balloons, the guy with the Super Soaker would reign supreme. That’s essentially the situation with the…
Shahmeer Amir
Nov 8, 2017
Revelation of how BTC networks can be exploited by an Anonymous individual
Revelation of how BTC networks can be exploited by an Anonymous ind...
Hey guys,
Shahmeer Amir
Dec 3, 2017
SAP Hana Cloud XSS
SAP Hana Cloud XSS
SAP HANA Cloud Platform is an open platform-as-a-service providing unique in-memory database and business application services. Quickly…
Shahmeer Amir
Apr 14, 2017
Conducting an IoT Pentest
Conducting an IoT Pentest
Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor…
Shahmeer Amir
Jun 9, 2017
An ancient Greek philosophy — the novel approach to Cyber-Security
An ancient Greek philosophy — the novel approach to Cyber-Security
I am certain the planet got used to getting enlightened from ancient Greece over and over again. From culture, education, arts, history…
Shahmeer Amir
Sep 10, 2017
WannaCry Ransomware Analysis and Decryption Methodolody
WannaCry Ransomware Analysis and Decryption Methodolody
Today is a bad day. Shadowbroker leak of NSA’s exploits lead to weaponization of emails with MS17–010 the SMB vulnerability exploitation…
Shahmeer Amir
May 13, 2017
Penetration Testing an SMTP Server
Penetration Testing an SMTP Server
Welcome to this article, where i will show you how to affectively pentest an SMTP server for information and vulnerabilities.
Shahmeer Amir
Oct 20, 2019
The Anatomy of the Careem Hack
The Anatomy of the Careem Hack
We live in the age of advancement and every second comes with an innovative outcome, but with that innovation comes its associated risks…
Shahmeer Amir
Apr 24, 2018
How a simple IDOR become a $4K User Impersonation vulnerability
How a simple IDOR become a $4K User Impersonation vulnerability
Hello everyone,
Shahmeer Amir
Jul 8, 2017
About Shahmeer Amir
Latest Stories
Archive
About Medium
Terms
Privacy
Teams