Amit NigamSubdomain Enumeration — Developing the Attack SurfaceSubdomain Enumeration is a key step that Hackers (or malicious actors) perform in order to get a better view of the target’s…Apr 182Apr 182
Amit NigamBreaking RSA Algorithm — Fermat’s SurpriseRecently I was doing a CTF challenge wherein the objective was to compromise the integrity of the RSA algorithm. Central to the challenge…Feb 29Feb 29
Amit NigamPrototype Pollution — A Deeper InspectionThis article aims at understanding some of the basic & intermediate concepts around Prototype Pollution in JavaScript and how it can be…Aug 3, 20231Aug 3, 20231
Amit NigamEmpline Walkthrough (THM) — Easy Box with OSCP flavourI recently completed a box on TryHackMe called Empline which I thought was a good box if you are preparing for exams like OSCP. It had one…Mar 11, 2023Mar 11, 2023
Amit NigamHacker View — Online PDF GeneratorsIn this article, we will try to understand some of the typical security concerns in online PDF generators that convert Markdown text or…Feb 12, 20231Feb 12, 20231
Amit NigamCult of Pickles — HTB ChallengeRecently I came across a very interesting challenge on HackTheBox relating to Pickling Vulnerabilities in Python. It was rated as “Easy”…Feb 12, 2023Feb 12, 2023
Amit NigamPickling Perils in PythonIn this article we will examine in detail what pickling or serialization is in Python. And build on that understanding to bring to light…Jan 24, 2023Jan 24, 2023