Recently, i got into learning how c#, c++ work with win32 API in windows and how powershell interacts with win32 API . That’s when i learned about process based memory injections and Disk based injections which are used to put malicious operations into an executable in the windows environment and…

Hello readers, so it has been a long-time since writing content . I recently cleared the OSCP certification with the PWK2020 edition. So this blog post will be about my experience, takeaways and the things to look out for in the OSCP.

//Please note the information below is based on…

Oauth2.0 framework and common security test cases

Introduction to Oauth

Oauth2 is an authorization framework at best. Consider the following generic example, Alice and Bob want to submit their CVs on a job posting website called JOBS.com. Now JOBS.com has two ways of uploading a CV. The first option uses Alice and Bob’s LinkedIn profile as their…

just_a_noob

Prakash Ashok, Security Analyst at WeSecureApp, CTF player, Blockchain developer and Security Researcher.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store