Open in app

Sign In

Write

Sign In

C M UPPIN
C M UPPIN

291 Followers

Home

Lists

About

Pinned

How i got a free delivery by signing up with “@company.com” #Bug Bounty write up

Hello everyone, today i’m back with another write-up, in this write-up i will explain, how i got a free delivery access to all my orders by signing-up with “@company.com”. Let’s start, When the target website doesn’t have 2F-Authentication enabled, this type of vulnerability usually works or it also works when the 2F-authentication…

Cybersecurity

1 min read

How i got a  free delivery by signing up with “@company.com” #Bug Bounty write up
How i got a  free delivery by signing up with “@company.com” #Bug Bounty write up
Cybersecurity

1 min read


Jul 29, 2022

Cyber Threats on Media and Entertainment Industry

Hola Hackers today we are going to discuss about operation methodologies of various Threat Actor Groups who are constantly attacking on Media and Entertainment Industry. Media and Entertainment is one of the industry which is always been in the radar of the Threat Actors. …

2 min read

Cyber Threats on Media and Entertainment Industry
Cyber Threats on Media and Entertainment Industry

2 min read


Published in

Techiepedia

·Jun 9, 2022

Certified Ethical Hacker Practical Exam Guide

Hola Hackers, Today I’m going to share my experience about the CEH Practical Exam, which i have cleared recently and scored 19/20, in this article ill share the tools, resources, Windows based commands, Linux based commands and some deep insights. Lets Start, It was a 6hrs exam, I’ve finished all the 19…

Ceh Certification

4 min read

Certified Ethical Hacker Practical Exam Guide
Certified Ethical Hacker Practical Exam Guide
Ceh Certification

4 min read


Published in

InfoSec Write-ups

·May 22, 2022

Operational Methodologies of Cyber Terrorist Organization “Transparent Tribe”

Hola Hackers, Today we are going to discuss about the Cyber Terrorist organization called Transparent Tribe which operates from Pakistan. In this Research blog we will discuss about the History, Tactics, Techniques and Procedures of the Transparent Tribe. Let’s Start, Transparent Tribe is the Cyber Terrorist organization which is founded in the…

Cyberterrorism

4 min read

Operational Methodologies of Cyber Terrorist Organization “Transparent Tribe”
Operational Methodologies of Cyber Terrorist Organization “Transparent Tribe”
Cyberterrorism

4 min read


Published in

InfoSec Write-ups

·Apr 6, 2022

Series of Network Fundamentals #5 (Ports & Protocols),to get started in Cyber Security.

Hola Hacker’s, today we are going to discuss about “Well known Port Numbers and Protocols”, which are used in Cyber Security industry everyday, in the last blog we learned about IPv4 and IPv6 make sure to read the previous blog. Let’s Start, What are Ports? Ports are used to communicate to a particular…

Networking

5 min read

Series of Network Fundamentals #5 (Ports & Protocols),to get started in Cyber Security.
Series of Network Fundamentals #5 (Ports & Protocols),to get started in Cyber Security.
Networking

5 min read


Nov 25, 2021

Series of CTF machines Walkthrough #7 Linux Privilege Escalation using SUID permissions.

Hello Hackers, In this blog we are going to learn how to escalate the privileges by exploiting the SUID bit permissions which are set to the files and programs, In the last blog we learnt about “SUDO exploitation”, so make sure to read the previous blog. For this blog, I’m…

Linux Priv Esc

3 min read

Series of CTF machines Walkthrough #7 Linux Privilege Escalation using SUID permissions.
Series of CTF machines Walkthrough #7 Linux Privilege Escalation using SUID permissions.
Linux Priv Esc

3 min read


Nov 24, 2021

Series of CTF machines Walkthrough #6 Linux Privilege Escalation using SUDO permissions.

Hello Hackers, In the last blog we learnt about “Kernel Exploit”, so make sure to read the previous blog, In this blog we are going to learn how to escalate the privileges by exploiting the miss-configured SUDO permissions. For this blog, I’m using the vulnerable machine from TryHackMe called “Linux…

Sudo

2 min read

Series of CTF machines Walkthrough #6 Linux Privilege Escalation using SUDO permissions.
Series of CTF machines Walkthrough #6 Linux Privilege Escalation using SUDO permissions.
Sudo

2 min read


Nov 24, 2021

Series of CTF machines Walkthrough #5 Linux Privilege Escalation using Kernel Exploit.

Hello Hackers, In the last blog we learnt about the different methods of Enumeration, so in this we are going to Exploit the vulnerable “Kernel” version. in TryHackMe there is a amazing learning path called “Linux Privilege Escalation”. Let’s Begin, What is Kernel? Kernel is the heart of the operating system, it provides an interface…

Kernel

3 min read

Series of CTF machines Walkthrough #5 Linux Privilege Escalation using Kernel Exploit.
Series of CTF machines Walkthrough #5 Linux Privilege Escalation using Kernel Exploit.
Kernel

3 min read


Oct 29, 2021

Series of CTF machines Walkthrough #4 Linux Privilege Escalation (Enumeration).

Hello Hackers, Today we are not only going to solve the CTF machine along with that, we are going to learn about how to do Enumeration and different methodologies to Elevate the Privileges. While solving the CTF machines “Privilege Escalation” is very important, escalating the user to higher privilege is…

Tryhackme

5 min read

Series of CTF machines Walkthrough #4 Linux Privilege Escalation (Enumeration).
Series of CTF machines Walkthrough #4 Linux Privilege Escalation (Enumeration).
Tryhackme

5 min read


Oct 20, 2021

Series of CTF machines Walkthrough #3 Previse From HackTheBox.

Hello Hackers, i hope you are doing well, today we are going to solve the “Previce CTF machine from HackTheBox” which is easy and you learn the different techniques. Let’s start, As usual scan the network using nmap by using the below command. nmap -sS -sC -sV -p- 10.10.11.104

Hackthebox Writeup

5 min read

Series of CTF machines Walkthrough #3 Previse From HackTheBox.
Series of CTF machines Walkthrough #3 Previse From HackTheBox.
Hackthebox Writeup

5 min read

C M UPPIN

C M UPPIN

291 Followers

Cyber Security Researcher || Security Analyst || CTF Player || Webapp Pentester || Ethical Hacker

Following
  • InfoSec Write-ups

    InfoSec Write-ups

  • ZeusCybersec

    ZeusCybersec

  • Andre Camillo

    Andre Camillo

  • Anangsha Alammyan

    Anangsha Alammyan

  • Rocco Pendola

    Rocco Pendola

See all (241)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams