Open in app

Sign in

Write

Sign in

Thirukrishnan
Thirukrishnan

77 Followers

Home

Lists

About

Published in

InfoSec Write-ups

·May 31

AllSafe (Intentionally Vulnerable Android Application)- Part 2

Hey fella! This is a continuation of the previous blog on Allsafe, a vulnerable Android application. In this, we will be getting to know some amazing attacks on Android applications which includes, Root Detection bypass Deep Link Exploitation Vulnerable Webview Certificate Pinning bypass Root Detection bypass: So before bypassing this security measure, we…

6 min read

AllSafe (Intentionally Vulnerable Android Application)- Part 2
AllSafe (Intentionally Vulnerable Android Application)- Part 2

6 min read


Published in

InfoSec Write-ups

·May 4

AllSafe (Intentionally Vulnerable Android Application)- Part 1

Hey fella!!!! I have been recently learning about Android Application Penetration Testing and to put my learning into action, I started looking out for some Vulnerable apps and CTF challenges. That is when I found this awesome GitHub repo with numerous resources and one among them was the AllSafe Vulnerable Android Application. GitHub - t0thkr1s/allsafe: Intentionally vulnerable Android application. Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable…github.com

Android Pentesting

6 min read

AllSafe (Intentionally Vulnerable Android Application)- Part 1
AllSafe (Intentionally Vulnerable Android Application)- Part 1
Android Pentesting

6 min read


Published in

InfoSec Write-ups

·Sep 26, 2022

HTML Injection inside Email body- The First BUG I hunted down in a Bug Bounty Platform!

Hola Amigo!! Today, I got my first Bug at Hackerone which is really interesting for me, and hope it will be the same for you too! I observed and exploited this Bug in an engagement (Web app Penetration Testing) at my workplace and thought of looking for it in an…

Bug Bounty

3 min read

HTML Injection inside Email body- The First BUG I hunted down in a Bug Bounty Platform!
HTML Injection inside Email body- The First BUG I hunted down in a Bug Bounty Platform!
Bug Bounty

3 min read


Published in

InfoSec Write-ups

·Jul 20, 2022

HTB-Business CTF

Payback PWN Challenge Hey there! I know it’s been a long since I wrote any blogs but I am now back with a bang! I always love pwn challenges in CTF though I am not that good at it. But still, I try to learn them and practice them a lot so as…

Binary Exploitation

7 min read

HTB-Business CTF
HTB-Business CTF
Binary Exploitation

7 min read


Mar 28, 2022

My PNPT(Practical Network Penetration Tester) experience and review

Hey buddy! Hope you are doing good! Recently I took the PNPT certification and have cleared it. So, I am here to share my experience taking the exam and the resources which helped me a lot. PNPT is one of a kind close to real-world certification which mainly focus on…

5 min read

My PNPT(Practical Network Penetration Tester) experience and review
My PNPT(Practical Network Penetration Tester) experience and review

5 min read


Jan 31, 2022

Everyday-Cyber

Day-4 Hello there! In this blog, you will learn different ways to get a reverse shell from a vulnerable machine in an internal network by pivoting through an external compromised machine. This challenge is also part of the wreath network from Tryhackme which you could check for further study. How to get a reverse shell from an internal network? First…

Exploiting

4 min read

Everyday-Cyber
Everyday-Cyber
Exploiting

4 min read


Jan 30, 2022

Everyday-Cyber

Day 3 Today it’s about some Active-Directory attacks. Getting the initial foothold by LLMNR poisoning Token impersonation LLMNR poisoning: LLMNR (Link-Local Multicast Name Resolution) is a protocol similar to DNS used for local domain name resolution. …

Active Directory

3 min read

Everyday-Cyber
Everyday-Cyber
Active Directory

3 min read


Jan 29, 2022

Everyday-Cyber

Day-2 Bonjour Ami/Amie !! In this blog, I will be discussing a few pivoting techniques which are Pivoting using SSH Pivoting using Metasploit What is pivoting? Pivoting is the art of using access obtained over one machine to exploit another machine deeper in the network. …

Pivoting

3 min read

Everyday-Cyber
Everyday-Cyber
Pivoting

3 min read


Published in

InfoSec Write-ups

·Jan 28, 2022

Everyday-Cyber

Day-1 Hola amigo!! It’s been a long since we met! Hope you are doing good! From now on to get back on track I will be writing something new every day related to offensive security. Also, I am about to take PNPT certification soon so you could even see some…

Osint Investigation

4 min read

Everyday-Cyber
Everyday-Cyber
Osint Investigation

4 min read


Oct 18, 2021

Docker

Hello there!!! In this blog I will be talking on the “Topic of the Moment” among IT and DEV folks which is Docker. This blog will be like a Q&A where a curious user(ME) asks questions regarding the docker and gets answers from a person who is an expert.(My …

Docker

6 min read

Docker
Docker
Docker

6 min read

Thirukrishnan

Thirukrishnan

77 Followers

An aspiring red-teamer sharing resources and knowledge to people.

Following
  • Anangsha Alammyan

    Anangsha Alammyan

  • Mukilan Baskaran

    Mukilan Baskaran

  • Scott Cosentino

    Scott Cosentino

  • Maksym Postument

    Maksym Postument

  • Galilei

    Galilei

See all (15)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams