Open in app

Sign In

Write

Sign In

Vikas Sharma
Vikas Sharma

56 Followers

Home

About

Nov 29, 2021

Broken — Access Control Vulnerability

Overview Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification or destruction of all data, or performing a business function outside of the limits of the user. Types of Access Control Vertical Access Control –Vertical access control…

Broken Access Control

5 min read

Broken — Access Control Vulnerability
Broken — Access Control Vulnerability
Broken Access Control

5 min read


Jul 19, 2021

Try Hack Me (THM): Pre-Security Path →Part 1

First of all, I would like to thank Josh Mason for providing me a THM premium subs which has given me driven force to work more and learn more!! Inspired by Josh Mason I decided to write a blog/write-up for the path I’ll be completing in the tenure of 6…

Thm Writeup

10 min read

Try Hack Me (THM): Pre-Security Path →Part 1
Try Hack Me (THM): Pre-Security Path →Part 1
Thm Writeup

10 min read


Jul 18, 2021

eJPT Course Review: INE Penetration Student (PTS)Course

PTS (Penetration Testing Student) is a course for beginner level certification eJPT (eLearnSecurity Junior Penetration Tester). PTS is available freely on INE platform and is designed by instructor Lukasz Mikula. …

Ejpt

11 min read

eJPT Course Review: INE Penetration Student (PTS)Course
eJPT Course Review: INE Penetration Student (PTS)Course
Ejpt

11 min read


May 18, 2021

SSI — Server Side Include Injection

Let us say , we have a web application containing multiple pages , each requires a change in the specific content (like may be name of user or anything). Therefore it would be difficult to change the HTML code manually every single time. …

Web Security

4 min read

SSI — Server Side Include Injection
SSI — Server Side Include Injection
Web Security

4 min read


Mar 19, 2021

What is Cyber Security and Why Is It Important?

Malicious attacks must be prevented at all nodes and endpoints in the network. As a result, Cyber Security or Information Security refers to the process of securing and minimising the effects of attacks on nodes such as servers, computers, and cell phones.

Cybersecurity

3 min read

What is Cyber Security and Why Is It Important?
What is Cyber Security and Why Is It Important?
Cybersecurity

3 min read


Mar 13, 2021

DEFEND-THE-WEB INTRO 1–7 CHALLENGES

Challenges Intro 1:

Ctf Writeup

3 min read

DEFEND THE WEB INTRO 1–7 CHALLENGES
DEFEND THE WEB INTRO 1–7 CHALLENGES
Ctf Writeup

3 min read


Mar 10, 2021

DNS Spoofing using BetterCap

DNS Spoofing refers to any attack that tries to change the DNS records returned to a querier to a response the attacker chooses. This can include some of the techniques described in DNS Hijacking, the use of cache poisoning, or some type of man-in-the-middle style attack. …

Dns Spoofing

3 min read

DNS Spoofing using BetterCap
DNS Spoofing using BetterCap
Dns Spoofing

3 min read


Feb 11, 2021

Script Kiddie : Hack The Box Walk Through

Recently HTB has released a machine named as Script Kiddie. Yess!! Script Kiddie which definitely gives hint about the machine. Like we can assume that we wont be doing much rather than relying on the tools for the same. Guess that’s what Script Kiddie means!! So lets see how easy…

Htb

5 min read

Script Kiddie — HTB
Script Kiddie — HTB
Htb

5 min read


Feb 7, 2021

Web-Application Security Resources

Got stuck?? Want to learn web hacking…Don’t know where to start from? Awesome!! We have the list of the resources where we can learn web application hacking in a guided manner ranging from theory concepts to practical knowledge. Online Hacking Demonstration Sites http://testasp.vulnweb.com/ — Acunetix ASP test and demonstration site http://testaspnet.vulnweb.com/ — Acunetix ASP.Net…

Web Application Security

3 min read

Web-Application Security Resources
Web-Application Security Resources
Web Application Security

3 min read


Feb 5, 2021

Delivery: Hack The Box Walk Through

Delivery is literally one of the easy machines on HTB. This doesn’t took much time and much efforts to complete the check points(user and root flag). Concepts Learnt: Web Recon HTML Injection MySQL Hashcat Port Scanning Using nmap, scanning the IP for the open ports and get details of the…

Htb

6 min read

Delivery : Hack The Box Walk Through
Delivery : Hack The Box Walk Through
Htb

6 min read

Vikas Sharma

Vikas Sharma

56 Followers

Just an another security nerd… CEH MASTER | PENTESTER

Following
  • Vickie Li

    Vickie Li

  • Tanvi Trivedi

    Tanvi Trivedi

  • Dhwani Patel

    Dhwani Patel

  • Harsh Bothra

    Harsh Bothra

  • Priyanshu Patel

    Priyanshu Patel

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech