Sayantan DattaAbusing Extended Stored Procedures in MS SQL (Transact SQL)Before getting into exploitation or attack flow. we should know the basics of stored procedures.Jan 2Jan 2
Sayantan DattaPicoCTF 2021: Transformation WalkthroughIt has been a while since I last wrote, but I am excited to get back into it.May 31, 2023May 31, 2023
Sayantan DattaGithub security resources- Pentesting| Bug bountyCollection of Github Repositories for ๐๐ฎ๐ฐ๐ธ๐ถ๐ป๐ด / ๐ฃ๐ฒ๐ป๐๐ฒ๐๐๐ถ๐ป๐ด / ๐๐๐ด ๐๐ผ๐๐ป๐๐.Apr 14, 2022Apr 14, 2022
Sayantan DattaLet`s Exploit using SUID FilesFor Linux privilege escalation the entry point should be to check for files with SUID/ GUID bit set. Which means the file can be run withโฆJan 28, 2022Jan 28, 2022
Sayantan DattaWeb Application Penetration Testing Study ResourcesPhase 1โโโHistoryMay 27, 2021May 27, 2021