PinnedC M UPPINHow i got a free delivery by signing up with “@company.com” #Bug Bounty write upHello everyone, today i’m back with another write-up, in this write-up i will explain, how i got a free delivery access to all my orders…1 min read·Aug 13, 2021--2--2
C M UPPINinInfoSec Write-upsDLL Side Loading Technique #Threat Hunting & #Adversary EmulationOne of my favorite techniques, which every APT group uses in cyber attacks, involves DLL SideLoading.2 min read·Jan 17, 2024----
C M UPPINCyber Threats on Media and Entertainment IndustryHola Hackers today we are going to discuss about operation methodologies of various Threat Actor Groups who are constantly attacking on…2 min read·Jul 29, 2022--1--1
C M UPPINCertified Ethical Hacker Practical Exam GuideHola Hackers, Today I’m going to share my experience about the CEH Practical Exam, which i have cleared recently and scored 19/20, in this…4 min read·Jun 9, 2022--5--5
C M UPPINinInfoSec Write-upsOperational Methodologies of Cyber Terrorist Organization “Transparent Tribe”Hola Hackers, Today we are going to discuss about the Cyber Terrorist organization called Transparent Tribe which operates from Pakistan…4 min read·May 22, 2022----
C M UPPINinInfoSec Write-upsSeries of Network Fundamentals #5 (Ports & Protocols),to get started in Cyber Security.Hola Hacker’s, today we are going to discuss about “Well known Port Numbers and Protocols”, which are used in Cyber Security industry…5 min read·Apr 6, 2022----
C M UPPINSeries of CTF machines Walkthrough #7 Linux Privilege Escalation using SUID permissions.Hello Hackers, In this blog we are going to learn how to escalate the privileges by exploiting the SUID bit permissions which are set to…3 min read·Nov 25, 2021----
C M UPPINSeries of CTF machines Walkthrough #6 Linux Privilege Escalation using SUDO permissions.Hello Hackers, In the last blog we learnt about “Kernel Exploit”, so make sure to read the previous blog, In this blog we are going to…2 min read·Nov 24, 2021----
C M UPPINSeries of CTF machines Walkthrough #5 Linux Privilege Escalation using Kernel Exploit.Hello Hackers, In the last blog we learnt about the different methods of Enumeration, so in this we are going to Exploit the vulnerable…3 min read·Nov 24, 2021----
C M UPPINSeries of CTF machines Walkthrough #4 Linux Privilege Escalation (Enumeration).Hello Hackers, Today we are not only going to solve the CTF machine along with that, we are going to learn about how to do Enumeration and…5 min read·Oct 29, 2021----