KarthikeyaninSystem WeaknessRooting Emulator and Installing MagiskIn this blog, we’ll dive into the intricacies of rooting Android Studio AVD. Given the challenges of obtaining physical devices for testing…Nov 21, 2023Nov 21, 2023
KarthikeyaninVault InfosecRCE via Account TakeoverIn this blog, I am gonna share about a bug that I came across while performing VAPT for a private project. This is a CMS website that I…Aug 25, 20231Aug 25, 20231
KarthikeyaninVault InfosecHow I found AWS Secret Key and Access Key via Threat Intelligence.First and foremost, begin to comprehend the web application’s business process and assemble the tech stacks of the applications. I have…Jun 12, 2023Jun 12, 2023
KarthikeyaninVault InfosecHow to Exploit Log4j Vulnerability over the InternetWelcome to this comprehensive guide on the log4j vulnerability. In this article, we will see what the log4j vulnerability is and how to…May 24, 20231May 24, 20231
KarthikeyaninSystem WeaknessEternal Blue exploit and PersistenceWe are going to see the eternal blue exploit and persistence module, the eternal blue exploit will work only on some windows machines like…Jan 12, 2022Jan 12, 2022
KarthikeyanPrivilege Escalation in Target using MetasploitWhen we exploit a machine like Windows, Android, etc.. some of the commands doesn’t work due to access denied, this is because we don’t…Jan 2, 2022Jan 2, 2022
KarthikeyanSecuring your Social mediaNowadays hacking social media ID like Facebook, Twitter etc.. occurring frequently. Lets see how to prevent ID from getting hacked. The…Dec 29, 2021Dec 29, 2021