SagarinTowards AWSAWS Lambda Command InjectionCommand Injection vulnerability is a daunting one. In this vulnerability, a threat actor can execute arbitrary commands on a host.5 min read·Dec 31, 2021--1--1
SagarinInfoSec Write-upsOWASP-Access Control VulnerabilityThis article is going to focus on Access control security and Broken Access control, it will summarize the thoughts, procedures and…6 min read·Oct 3, 2021----
SagarinInfoSec Write-upsWEB APPLICATION — BUSINESS LOGIC VULNERABILITIESBuisness logic vulnerabilities are flaw in the design, implementation and concept of an application, that allow an attacker to evoke…5 min read·Sep 13, 2021----
SagarinTowards AWSAttack on AWS S3 via SSRFThis article is based on a true incident that happened with Capital One, where almost 106 million customer accounts were breached. Paige…4 min read·Aug 24, 2021--1--1
SagarinTowards AWSAuthenticated ‘Write’ access — AWS s3 Bucket(By Sagar and Shubham Kumar)5 min read·Jul 16, 2021--2--2
SagarinTowards AWSSUBDOMAIN TAKEOVER — AWS S3 BUCKETIn this article, we are going to understand and know how a small vulnerability can cause havoc and result in a subdomain takeover.5 min read·Jul 8, 2021--3--3
SagarTHE INFAMOUS DOSUndoubtedly DOS (Denial of Service) is one of the most simplest and famous type of network attack, where instead of directly stealing the…5 min read·Jun 10, 2021--1--1
SagarTHE ART OF ACTIVE SNIFFINGIn the world of networking, sniffing is a process of monitoring and capturing all the packets flowing through a network.4 min read·Jun 2, 2021--1--1
SagarICMP — MORE THAN YOU THINKIn the world of networking among ’n’ number of protocols , there is one which is always vital for this field and always being the…8 min read·Jan 10, 2021--3--3