V1P3RKubernetes Goat walkthrough-IIThis is the second part of Kubernete's walkthrough. Also, you can find it here, and for Kubernetes basic find it here.Aug 5, 2022Aug 5, 2022
V1P3RAndroid Pentesting on Oversecured Vulnerable Android AppOversecured is an android/ios application vulnerability scanner. Where they created an android vulnerable application for demo…Jul 29, 2022Jul 29, 2022
V1P3RKubernetes Goat walkthrough-IThis blog explains the pentest for Kubernetes, we are going to use a vulnerable Kubernetes cluster. Kubernetes Goat was designed by Madhu…Jun 26, 2022Jun 26, 2022
V1P3RKubernetes Pentest(Basics)Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management. Google originally…Jun 9, 2022Jun 9, 2022
V1P3RinSystem WeaknessCompromise domain with NoPac exploitDuring the last pentesting in client infra, we compromised a domain with CVE-2021–42287/CVE-2021–42278(noPac) exploits. Gonna give a tip on…Apr 12, 2022Apr 12, 2022