Karan ShergillRegular Expressions for Hackers — IUnraveling the Power of Regular Expressions: Demystifying Key Concepts and Usage.Jun 8, 2023Jun 8, 2023
Karan ShergillExploiting TFT Protocol and LXD to Gain Unauthorized Access: Chaining VulnerabilitiesExploring the process of exploiting a Local File Inclusion (LFI) vulnerability, Trivial File Transfer Protocol (TFTP) and the LXD API.Mar 22, 2023Mar 22, 2023
Karan ShergillHow an IDOR Can Wreak Havoc: Breaking through the front door!Unleashing the Power of Insecure Direct Object Reference (IDOR) VulnerabilitiesMar 2, 2023Mar 2, 2023
Karan ShergillNetwork File System (NFS): Enumeration & ExploitationGaining unauthorized access to sensitive files and other data on remote systems by exploiting NFS.Feb 22, 2023Feb 22, 2023