Poison was one of the machine in hack the box and got retired few minutes back. It was my first box and took me a bit long to root this for no reason. Why Poison was my first box? Because I had to start with something really
Saturday, 8 September 2018
Saturday, 25 August 2018
Celestial - Hack The Box
SPOILER ALERT!! Celestial was pretty straightforward. It was not as easy as Poison to achieve user access. Though root was pretty easy. Celestial made me do alot of different things and in the process learned alot of new things. This is the advantage of Hack The Box as
Wednesday, 3 May 2017
Hands on Eternalblue, Doublepulsar and Patch
I know, I am writing after a quite long time but I had to! Eternalblue and Doublepulsar are the exploits by NSA which were leaked by Shadow Brokers. These leaks are known to be a big Cyber Chaos after Stuxnet. I though to dive into it. Setting up
Sunday, 22 May 2016
Penetration Testing and Its Methodology
Following is the video about Penetration testing and the mythologies used to implement it. You can view and download the presentation here
Friday, 1 April 2016
InfoSec Positions today!
When we dive into InfoSec, we generally try finding what are the jobs positions, what are their role, etc.. With a small compilation, lets find what all position we have in the filed of Security and what are their roles. Following is a small list: Security Engineer: Security
Sunday, 8 November 2015
Bug Bounty!!
The Bug Bounty Trends These days in India there's lot of people into earning money via Bug Bounty.. What actually bug bounty is? An ATM Machine where people get dollars?? Actually no. Lets see what it is actually and why there is more craze about bug bounty especially
Wednesday, 15 July 2015
The Famous Top 10!
By
Secure Dose
11:08
csrf, data exposure, injection, insecure direct object reference, misconfiguration, owasp, owasp top 10, penetration testing, slack, testing, unvalidated redirects, vulnerabilities, vulnerability assessment, xss
Introduction: The title says it all. This is a list which has world top 10 vulnerabilities being found on web application. Every person from the InfoSec community knows about it but as a beginner you should know about it. In this post we'll check out what are this
Subscribe to:
Posts (Atom)