HarshitExploiting the Silent Threat: Time-Based Blind SQL Injection via the Object_ID ParameterIntroductionSep 7Sep 7
HarshitMastering the Art of Logging: A Hacker’s Guide to Monitoring SystemsIn the world of cybersecurity, logging is an often-overlooked but essential tool for both attackers and defenders. Whether you’re a…Aug 22Aug 22
HarshitHacking Large Corporations: The Art and Science of ReconnaissanceIn the realm of cyberattacks, reconnaissance is the cornerstone of any sophisticated hacking operation. For hackers targeting large…Aug 15Aug 15
HarshitHow I Hacked and Secured a Croatian Government Website: A White Hat JourneyIn the realm of cybersecurity, tales of hacking often evoke images of nefarious activities, shady characters, and ill-gotten gains…Aug 3Aug 3
HarshitHow I Secured Berlin Polizei by Exploiting a Server-Side Misconfiguration Attack via XML-RPCAs an ethical hacker, my mission is to identify and rectify vulnerabilities before they can be exploited by malicious actors. Recently, I…Jul 22Jul 22
HarshitWhy gets() is bad / Buffer OverflowsThe gets() function in C is considered bad and unsafe due to its potential for causing buffer overflows. When using gets(), the function…Dec 5, 2023Dec 5, 2023
HarshitinOSINT TeamMonitoring the Dark WebIn the ever-evolving landscape of cybersecurity, monitoring the dark web has become a critical task for organizations aiming to protect…Nov 7, 2023Nov 7, 2023
HarshitAWS ELB :Distributes incoming network trafficAmazon Web Services (AWS) Elastic Load Balancing (ELB) is a service designed to efficiently distribute incoming network traffic across…Oct 31, 2023Oct 31, 2023
HarshitHacking and Securing Python ApplicationsPython applications have become indispensable tools for businesses and individuals alike. However, their widespread use also makes them…Oct 27, 2023Oct 27, 2023