Published inOSINT TeamThe Importance of the HSTS HeaderThe first time I came across the HSTS Header was when researching and analyzing bugs raised by my senior. It was discovered that the HSTS…3d ago13d ago1
Published inOSINT TeamHow I Learnt the Importance of CSP from File Upload VulnerabilityHow to Test for Malicious File Upload?Mar 19Mar 19
Published inOSINT TeamWhy Your Passwords Can Never Be Safe: A Deep Dive into Password AttacksAlmost all applications use passwords as a security measure. But still, news of password breaches keeps popping up time and again…Mar 12Mar 12
Published inILLUMINATIONMasala Dose: A Timeless South Indian FavoriteMasala dose (doh-say) is a beloved South Indian breakfast, though it’s often enjoyed for lunch and dinner as well.Mar 101Mar 101
Published inLong. Sweet. Valuable.5 Insights on Life: Navigating Choices and Finding ClarityBecause you have to live your life.Oct 18, 20241Oct 18, 20241
Published inWord Garden5 Simple Truths for a Meaningful LifeHow Time, Purpose, and Composure Shape Our JourneyOct 17, 20241Oct 17, 20241
Published inILLUMINATIONA Heartfelt Taste: Discovering Thai Food in AustraliaWhen I visited my cousin’s place in Australia, they took me to a Thai restaurant. We walked to the restaurant, and the walk felt long…Oct 17, 2024Oct 17, 2024
Published inOSINT TeamBeware of XXE: When XML Turns Against You!What is an XXE (XML External Entity) Attack?Oct 16, 2024Oct 16, 2024
Published inOSINT TeamZero-Day Exploits: The Cyber Attack You Can’t See ComingWhat is a Zero-Day Exploit?Oct 11, 2024Oct 11, 2024
Choosing Truth Over Illusion: A Path Beyond TimeLessons from Naimisha: God’s Own Story the Beginning by SeshaOct 8, 2024Oct 8, 2024
Must-Know Lessons You Should Learn Early in LifeLessons I Learned from the book ‘Life is Abracadabra’ by Baisakhi SahaOct 6, 20241Oct 6, 20241
Published inSystem WeaknessHow Internal Path Disclosure Exposes Your Website to HackersWhat is Internal Path Disclosure (IPD)?Oct 5, 20241Oct 5, 20241
Published inOSINT TeamHow ASLR Protects Your System from Memory-Based ExploitsWhat is Address Space Layout Randomization (ASLR)?Sep 30, 2024Sep 30, 2024
Published inSystem WeaknessObfuscation vs EncryptionObfuscation and Encryption are two techniques used to protect data and make it harder for others to understand. But they work in different…Sep 28, 2024Sep 28, 2024
Published inILLUMINATIONHow a Small Compliment Can Make a Big DifferenceThere is a small ice cream shop where I used to see a lot of people eating ice cream, always. I finally visited the shop to see what the…Sep 25, 2024Sep 25, 2024
Published inInfoSec Write-upsDoS and DDoSDoS and DDoS are types of cyber-attacks that prevent the users from using the system or application by overloading them.Sep 22, 2024Sep 22, 2024