Published inInfoSec Write-upsHacking Misconfigured Cloud AppsLast year that is 2020, more than 89% of fortune 500 companies adopted the cloud infra. Cloud is really powerful and due to the current…Apr 2, 2021Apr 2, 2021
Published inInfoSec Write-upsGetting started with DockerThe goal of this blog is to introduce readers to docker and help them set up their first docker image.Jul 7, 2020Jul 7, 2020
Published inInfoSec Write-upsFinding Path Traversal VulnerabilityLocal File Inclusion (LFI) also known as path traversal is a vulnerability that can potentially allow an attacker to view sensitive…Apr 14, 2020Apr 14, 2020
Published inInfoSec Write-upsHunting Session OverloadingIn order to hunt session-based flaws in a website, One must know the head and tail about session and cookies in general. So Let’s just…Apr 12, 2020Apr 12, 2020