Skip to content

TechKranti

CyberSecurity Revolution

Bash: Numeric For Loop

June 23, 2020 Amey Anekar Tips & Tricks

To loop through a numeric sequence on bash, use the following syntax

Continue reading

What is “Content-Type: application/x-protobuf”: Protobuf Explained For Hackers

April 1, 2020 Amey Anekar Cyber Security Gyaan

Have you ever come across this header:

Content-Type: application/x-protobuf

Read on to know what it means and what are possible attack scenarios.

Continue reading

How I Reported a DoS Vulnerability to AWS

March 11, 2020 Amey Anekar Bounty Hunting

BadBotHoneypotEndpoint is used by AWS customers who do not want bots, unauthorised spiders and scrapers to scan their site. It works by blacklisting IP addresses of such bots. I discovered a vulnerability with this endpoint that could allow an attacker to blacklist random IPs.

Continue reading

How I discovered an SSRF leading to AWS Metadata Leakage

February 10, 2020 Amey Anekar Bounty Hunting

This is the story of a juvenile SSRF bug who did know it had the potential to look at AWS secrets. 😮

Continue reading

WhatsApp Bug Causes App Crash & Permanent Loss of Group Chat Messages

January 5, 2020 Amey Anekar Cyber Security News & Updates

Check Point Software Technologies Ltd. (Check Point), a leading provider of cybersecurity solutions has found a bug that could let an attacker deliver a specially crafted group chat message that causes a crash of the WhatsApp application for all members of the group chat.

Continue reading
GPS Spoofing Featured Image

GPS Spoofing, now a reality

December 24, 2019 Amey Anekar Cyber Security News & Updates

Global Positioning System (GPS) is one technology which has never been looked at through a security lens by the wider audience. We have become dependent on the GPS for our day-to-day lives. However, it is no longer reliable.

Continue reading
CVSS Logo

What The Heck is CVSS – Part I

November 24, 2019 Amey Anekar Cyber Security Gyaan

Every security researcher, information security personnel or IT personnel should understand CVSS well because this scoring system not only helps you understand the intrinsic severity of the vulnerability but it also provides a way to modify the severity level specific to your environment.

Continue reading
ransomware

PureLocker Ransomware: One of its kind. Probably, the first of its kind.

November 24, 2019 Amey Anekar Malware Reports & Analysis

A new ransomware, dubbed PureLocker, has been identified by researchers that is being used for targeted attacks against production servers of enterprises.

Continue reading

Posts pagination

«Previous Posts 1 … 16 17 18

About Me

Hey There, I am Amey Anekar - Cyber Security Specialist with a passion for solving security problems even when resources are limited. I've been fortunate to develop a knack for gauging an organization's cyber security posture and helping them plan a transition towards becoming more resilient in the face of cyber threats. It's a privilege to be able to contribute to the field and assist organizations in safeguarding their digital assets. Get In Touch    

Search TechKranti

Top Posts & Pages

  • What is "Content-Type: application/x-protobuf": Protobuf Explained For Hackers
  • IDOR through MongoDB Object IDs Prediction
  • How I discovered an SSRF leading to AWS Metadata Leakage

Categories

  • Bounty Hunting
  • Chrome Extension Development
  • Cyber Security Gyaan
  • Cyber Security News & Updates
  • Malware Reports & Analysis
  • Programming
  • Secure Coding
  • Tips & Tricks

Follow Us

  • Facebook
  • Twitter
WordPress Theme: Mercia by ThemeZee.