KarthikeyaninSystem WeaknessRooting Emulator and Installing MagiskIn this blog, we’ll dive into the intricacies of rooting Android Studio AVD. Given the challenges of obtaining physical devices for testing…3 min read·Nov 21, 2023----
KarthikeyaninVault InfosecRCE via Account TakeoverIn this blog, I am gonna share about a bug that I came across while performing VAPT for a private project. This is a CMS website that I…3 min read·Aug 25, 2023--1--1
KarthikeyaninVault InfosecHow I found AWS Secret Key and Access Key via Threat Intelligence.First and foremost, begin to comprehend the web application’s business process and assemble the tech stacks of the applications. I have…2 min read·Jun 12, 2023----
KarthikeyaninVault InfosecHow to Exploit Log4j Vulnerability over the InternetWelcome to this comprehensive guide on the log4j vulnerability. In this article, we will see what the log4j vulnerability is and how to…3 min read·May 24, 2023--1--1
KarthikeyaninSystem WeaknessEternal Blue exploit and PersistenceWe are going to see the eternal blue exploit and persistence module, the eternal blue exploit will work only on some windows machines like…4 min read·Jan 12, 2022----
KarthikeyanPrivilege Escalation in Target using MetasploitWhen we exploit a machine like Windows, Android, etc.. some of the commands doesn’t work due to access denied, this is because we don’t…3 min read·Jan 2, 2022----
KarthikeyanSecuring your Social mediaNowadays hacking social media ID like Facebook, Twitter etc.. occurring frequently. Lets see how to prevent ID from getting hacked. The…2 min read·Dec 29, 2021----