Open in app

Sign in

Write

Sign in

Mritunjay Kumar
Mritunjay Kumar

33 Followers

Home

About

Pinned

Exploiting Privilege Escalation to Disclose Secrets Through XXE

A series of blogs having interesting cyber security vulnerabilities. Follow Along! Overview Privilege Escalation → Username Enumeration → XXE → Directory Traversal → Configuration File Exposure Privilege Escalation As the name suggests, privilege escalation occurs when a user is able to access information / functionality which he is not supposed to access by…

Xxe

5 min read

Exploiting Privilege Escalation to Disclose Secrets Through XXE
Exploiting Privilege Escalation to Disclose Secrets Through XXE
Xxe

5 min read


Mar 5

Malware Analysis: The Dissection and Detection

We will be going through the methodology to dissect a Malware and create a detection mechanism for it. The objective of this blog is to shed some light on the Malware Analysis methodology and create a YARA rule to detect its presence. Tools Used: CFF Explorer ExeinfoPE PEStudio YARA The…

Malware Analysis

4 min read

Malware Analysis: The Dissection and Detection
Malware Analysis: The Dissection and Detection
Malware Analysis

4 min read


Mar 2

Denial of Service: Creating Mayhem was never so Easy

In this blog, I will be talking about a very critical vulnerability in the authentication mechanism of a web application that leads to Denial of Service (DOS). A Denial of Service, as the name suggests is a scenario where a service becomes unavailable for a legitimate user. The reason could…

Bug Bounty

4 min read

Denial of Service: Creating Mayhem was never so Easy
Denial of Service: Creating Mayhem was never so Easy
Bug Bounty

4 min read


Mar 1

Authentication Bypass and SQL Injection

A series of blogs having interesting and impactful cyber security vulnerabilities from real world assessments as well as a testing environment. Follow along! — A web application requires a user to get authenticated in order to maintain his session, this is similar to how you login to your Facebook or Instagram account. …

Cyber Security Training

5 min read

Authentication Bypass and SQL Injection
Authentication Bypass and SQL Injection
Cyber Security Training

5 min read

Mritunjay Kumar

Mritunjay Kumar

33 Followers

A simple guy

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams