PinnedSaumya KasthuriDemystifying SAML Misconfigurations — Hacking SAML Part 2Welcome to Part 2 of our SAML exploration. In the previous part, we laid the groundwork by dissecting SAML’s fundamental aspects. Now, we…Oct 31, 2023Oct 31, 2023
PinnedSaumya KasthuriDemystifying SAML Misconfigurations — Hacking SAML Part 3Welcome to the last part of our complete SAML series. In Part 2, we talked about problems, but there’s more to learn. In Part 3, we’re…Oct 31, 2023Oct 31, 2023
PinnedSaumya KasthuriDemystifying SAML Misconfigurations — Hacking SAML Part 1Welcome to our three-part series on Security Assertion Markup Language (SAML). SAML is a crucial framework for implementing Single Sign-On…Oct 25, 2023Oct 25, 2023
PinnedSaumya KasthuriAndroid Pentesting 101: A Novice’s Handbook to Getting StartedAndroid pentesting is the process of evaluating the security of an Android application by identifying its vulnerabilities and weaknesses…Oct 18, 20233Oct 18, 20233
PinnedSaumya KasthuriHacking Apps using NoSQL InjectionsThis article takes you through an example of an application vulnerable to injection supported by a NoSQL database (MongoDB). In common…Nov 8, 2022Nov 8, 2022
Saumya KasthuriHow Blockchain Works: A Closer LookBlockchain technology is a decentralized and distributed digital ledger that records transactions securely and transparently. Here are the…Jan 9Jan 9
Saumya KasthuriBlockchain Unveiled: A Rookie’s Guide to Understanding the BasicsBlockchain is a revolutionary technology that is redefining the way we interact with each other and transfer value. This article will…Jan 9Jan 9
Saumya KasthuriThunder CTF Walkthrough — Part 1Thunder CTF is a fantastic opportunity to challenge your skills, expand your knowledge, and test your understanding of GCP security. The…Feb 22, 2023Feb 22, 2023
Saumya KasthuriGetting Started with Google Cloud PlatformGoogle Cloud Platform is a cloud-based computing platform that offers a variety of services for businesses and individuals, including…Feb 21, 2023Feb 21, 2023