Published inInfoSec Write-upsTCS HackQuest Season 9How I got the Offer & My experience with the selection process2d ago2d ago
Published inInfoSec Write-upsExploiting Log4Shell — How Log4J Applications Were HackedA Deep Dive into the Log4Shell Vulnerability [CVE-2021–44228]Mar 19Mar 19
Published inInfoSec Write-upsWhy You Need a Digital Garden (How to Start Guide)Stop Letting Your Ideas Get Lost — Build a Knowledge HubFeb 184Feb 184
Published inInfoSec Write-upsShellshock — A deep dive into CVE-2014–6271I created a lab to demonstrate this vulnerabilityFeb 8Feb 8
Published inInfoSec Write-upsStrutted Walkthrough — HackTheBoxStrutted — a Medium Linux Machine teaches Apache Struts 2 CVE and then misconfigured sudo permission.Jan 27Jan 27
Published inT3CHSightless Walkthrough — HackTheBoxIn this write-up, We’ll go through an easy Linux machine ‘Sightless’.Jan 13Jan 13
Published inT3CHSea Walkthrough — HackTheBoxIn this write-up, We’ll go through an easy Linux machine where we first gain an initial foothold by exploiting a CVE.Dec 22, 2024Dec 22, 2024
Published inOSINT TeamServer-Side Request Forgery (SSRF) | PortSwigger labs | Part 1Server-side request forgery that allows an attacker to cause the server-side application to request an unintended location.Nov 7, 2024Nov 7, 2024