Pradeep KumarinInfoSec Write-upsUnlocking OAuth SecurityIn this blog, we will uncover the different oauth security implications on both the client applications and the oauth server.Aug 26Aug 26
Pradeep KumarinInfoSec Write-upsUnlocking Kubernetes Security: The Complete ChecklistKubernetes has quickly become the go-to system for managing containerized apps, making it a massive playground for both deploying cool apps…Jul 8Jul 8
Pradeep KumarJNDI Injection — Attack FlowIn this blog, we will be focusing on how the JNDI attack works from behind the scene. For understanding the basics and exploitation of…May 25May 25
Pradeep KumarinInfoSec Write-upsJNDI Injection — The Complete StoryThis blog investigates the security implications of JNDI Injection, a vulnerability that arises when malicious actors manipulate JNDI…May 14May 14
Pradeep KumarinInfoSec Write-upsUnveiling Command Injection Vulnerabilities in Java: Deep dive into ProcessBuilder and RuntimeJava’s ProcessBuilder and Runtime classes offer powerful functionality, but they also come with risks.Feb 27Feb 27
Pradeep KumarinInfoSec Write-upsPII Leakage via IDOR + Weak PasswordReset = Full Account TakeoverHello Hunters, this is a quick write up on one of my recent findings on a bug bounty program. Before jumping into the vulnerability, let…Sep 25, 2020Sep 25, 2020
Pradeep KumarSarcon CTF — Web ChallengeThis was only challenge for the Web category. We were provided with a URL and wordlist file.Apr 25, 2020Apr 25, 2020