Public Key Infrastructure Notesgayatri r·FollowFeb 9, 2021--ListenShareHi Friends,I am sharing my notes which I jotted down for my reference, excuse me if I made any mistakes and my englishAnd I have yet to complete the other things on PKI. Stay tuned.
gayatri rSetup BloodHound tool on Windows and enumerate Active Directory Objects•BloodHound is an application used to visualize active directory environments. The front-end is built on electron and the back-end is a…3 min read·Oct 23, 2020--
gayatri rP2 Vulnerability -Account takeover using OAuth MisconfigurationVulnerability Category: A6- Security Misconfiguration2 min read·May 22, 2019--1
gayatri rFailure to Invalidate Session on LogoutVulnerability Category: A5-Broken Access Control1 min read·May 23, 2020--
gayatri rSharepoint Website Information disclosure and came make it to RCE(unfortunately i couldn’t)This is the bug I have found in some vdp program and they really don’t have time to reply back i guess so posting the vulnerability…2 min read·May 23, 2020--3
Totally_Not_A_HaxxerReverse Engineering: Binary SecurityIntroduction to how horribly forgotten binary security has become, mistakes hackers make, cracking game cheats and protecting your own apps73 min read·Jun 15--
Z4kiAndroid Deep Links exploitationRecently, I have been studying Android penetration testing, and I came across a new topic called ‘Deep Links’. Since it is a new topic to…5 min read·Oct 30--
Shellmates ClubOAuth 2.0 Authentication Misconfigurationwritten by Mohamed Lakhdar Metidji8 min read·Jul 27--
$$$->K0bR4<-$$$Wi-Fi Security: Penetration Test on WPA/WPS/WPA2 and Beacon Frames SpoofingIn the vast landscape of Wi-Fi penetration testing, there are many excellent open source tools, but addressing modern protections requires…5 min read·Nov 16--
Alexis LingadCyber Security Certifications are USELESS if You Don’t Do These Things…Credits to https://pauljerimy.com/security-certification-roadmap/5 min read·Oct 31--4
Harsh BothraThe Power of Reporting: How to write effective reportsThe bulwark of our digital ecosystem, Penetration Testing (pentesting), has the arduous task of staving off numerous cyber threats. An…6 min read·Aug 6--1