Nov 3Security Beyond Browsers: Why CORS Doesn’t Apply to Mobile ApplicationsWe have been using Mobile Applications and Web Browsers for more than two decades now and many times heard about the vulnerabilities in Mobile Applications and Web Browsers. Many vulnerabilities are common but many are not. …Cors3 min readCors3 min read
Jan 9, 2022AgentSudo Write-Up: TryHackMe Machine Walk-throughMachine Description : AgentSudo is a very interesting Linux based machine which will walk us through the a number of cryptographic tools and techniques. I have been assigned a dynamic IP address and you might get a different one. …Agent Sudo Walkthrough5 min readAgent Sudo Walkthrough5 min read
Nov 21, 2021BountyHunter Walkthrough: HackTheBox WriteupBountyHunter is a very simple Linux machine designed for beginners. In this walk-through we will be going understand how to gain user and root access of a machine. The IP address assigned to me here is 10.10.11.100 …Hackthebox Writeup4 min readHackthebox Writeup4 min read
Nov 9, 2021TomGhost Write-Up : TryHackMe Walk-throughTomghost is a Linux machine which is deployed on TryHackMe. It is a defined as a easy level box. We do not require any special access to solve this box. We just have to register on TryHackMe and continue with it. Connect via VPN → Join the room → Start…Writeup4 min readWriteup4 min read
Oct 19, 2021Cap Walk-through: HackTheBox Machine Write-upCap is a very simple Linux machine designed for beginners. In this walk-through we will be going understand how to gain user and root access of a machine. In the above image you can see that IP: 10.10.10.245 …Htb4 min readHtb4 min read
Jun 9, 2021BackDoor 3: Walkthrough of NET-SQUARE Hacking Warm-Up Mobile Application ChallengeRecently I got an opportunity to participate in a CTF (Capture-The-Flag) event which was organized by NET-SQUARE. They had their different set of challenges with respect to Mobile, Web, Network, Source Code, and Thick/Thin Client. …Android6 min readAndroid6 min read
Jun 9, 2021BackDoor 2: Walkthrough of NET-SQUARE Hacking Warm-Up Mobile Application ChallengeRecently I got an opportunity to participate in a CTF (Capture-The-Flag) event which was organized by NET-SQUARE. They had their different set of challenges with respect to Mobile, Web, Network, Source Code, and Thick/Thin Client. …Mobile Security4 min readMobile Security4 min read
Jun 9, 2021BackDoor 1: Walkthrough of NET-SQUARE Hacking Warm-Up Mobile Application ChallengeRecently got an opportunity to participate in a CTF (Capture-The-Flag) event which was organized by NET-SQUARE. They had their different set of challenges with respect to Mobile, Web, Network, Source Code, and Thick/Thin Client. …Mobile Security3 min readMobile Security3 min read
Sep 27, 2020Universe Weird C132 : Android Application Based CTF Challenge WalkthroughUniverse Weird C132 is a beginner level Android application CTF challenge. It makes you realise that every application is a treasure hunt, more of a treasure and less of a hunt. The aim of this CTF challenge is to concentrate on the basic flaws which are found while performing security…Reverse Engineering5 min readReverse Engineering5 min read
Sep 27, 2020Morty’s New Tool : Android Application Based CTF Challenge WalkthroughMorty’s new tool is an intermediate level Android application CTF challenge. The basic aim of this CTF challenge is to learn the dynamic transformation in the code at run time, reverse engineering of native libraries and much more. It will give an atmosphere of real time scenarios which will teach…Frida5 min readFrida5 min read