Pinnedraj3shpExploiting Linux systems with ptraceLinux comes with an interesting system call ptrace which can be abused to elevate privileges and steal sensitive information.Sep 10, 2022Sep 10, 2022
Pinnedraj3shpPython Security “logging.config” code executionPython’s Security Considerations document lists following about the logging moduleApr 1, 2022Apr 1, 2022
Pinnedraj3shpCTF Writeup: HackTheBox — RemoteIn 2020 (thanks to COVID lockdowns), I started working on HackTheBox challenges. It is too much fun! I finally got some time to go through…Jan 3, 2021Jan 3, 2021
raj3shpExploiting Python de-serialization to achieve RCEThe pickle module implements binary protocols for serialising and de-serialising a Python object structure.Feb 14, 2021Feb 14, 2021
raj3shpCTF Writeup | NATAS 12 : PHP File upload vulnerabilityNATAS Level 12 presents you with a simple file upload functionality. You can upload an image and file and view it later in /upload…Feb 14, 2021Feb 14, 2021
raj3shpCTF Writeup | NATAS #11 : PHP Weak EncryptionI started with capture the flag (CTF) exercises to practice my web hacking skills. This post is about one of the interesting challenges I…Feb 14, 2021Feb 14, 2021