Exploiting the Log4J Vulnerability [CVE-2021–44228]Well it looks like Christmas came early for pentesters , hackers and bug bounty hunters. First, the grafana 0-day exploit that made…Dec 12, 20211Dec 12, 20211
Simple In-Memory InjectionRecently, i got into learning how c#, c++ work with win32 API in windows and how powershell interacts with win32 API . That’s when i…Sep 19, 2021Sep 19, 2021
Another OSCP tale- an outlook into it.Hello readers, so it has been a long-time since writing content . I recently cleared the OSCP certification with the PWK2020 edition. So…Mar 28, 2021Mar 28, 2021
Hunting and Exploiting Apache GhostcatThe Apache Ghostcat vulnerability is a file inclusion vulnerability which came out in the first quarter of this year while the world was…May 30, 2020May 30, 2020
Oauth and SecurityIn this post we will look at Oauth2.0 framework and common security test cases that can be performed.Apr 19, 20201Apr 19, 20201
Published inCoinmonksUnderstanding, learning and owning of a Blockchain machineHello readers, in this article i just want to share my experience of working around a Machine named Chainsaw. I am a noob to network…Dec 22, 2019Dec 22, 2019
GraphQL vs REST API model, common security test cases for GraphQL endpoints .The traditional REST model is similar to doing following tasks like getting your shipments delivered to you, ordering food online i.e, two…Dec 7, 2019Dec 7, 2019