Piyush PradhanBuilding my own SIEM homelabFor this project I’m choosing Splunk and setting it up in a local virtual machine.Jul 3, 2022Jul 3, 2022
Piyush PradhanThe Defender’s path in FLAWS2Okay, so this isn’t like a challenge, more like a walkthrough. Just has a set of instructions that explains how security works in AWS,and…Jun 8, 2022Jun 8, 2022
Piyush PradhanGoing down the attacker path — FLAWS2To be honest, I wasn’t sure how to approach this one, I checked my notes from flaws.cloud challenge (the first version) I tried looking at…Jun 5, 2022Jun 5, 2022
Piyush PradhanEnumerating active directory using C#My main motive was to understand how it all works behind the scenes, so that it is easier for me to attack it.May 5, 2022May 5, 2022
Piyush PradhanCloud security with flaws.cloudIn the past week, I’ve been spending my time playing around with cloud services, deploying random stuff just to try and figure out how it’s…Apr 16, 2022Apr 16, 2022
Piyush PradhaninSystem WeaknessLearning about Spring4Shell exploitI’m pretty sure you might have heard about the infamous “Spring4Shell” exploit by now, so rather than boring you with the details about how…Mar 31, 2022Mar 31, 2022
Piyush PradhanLearning binary exploitation — 3The vulnerable code I used in this blog:Jan 22, 2022Jan 22, 2022
Piyush PradhanLearning binary exploitation — 2After understanding the basics of how the memory diagram looks and how the stack works, I moved on to the exploitation part.Jan 21, 2022Jan 21, 2022