Writer Profile
Club Member
Connect
Hey there! Myself Rohan. I'm an undergrad at MIT, Manipal. I'm basically a very lazy person which makes me do my work and tasks in an easier and faster way lol.. I' m a front-end web developer and tech enthusiast.. Always hungry for new things!!!.. I belive if u want to achieve some thing " Stop Saying One Day and Start Working From Day one." Explore the world so that you won't regret yourself at the end of the day!!
BREACHES
DDoS attack three times bigger than the largest to date recorded
1 year ago
The largest-ever volumetric DDoS attack to date has been recorded on Thursday by web infrastructure and website security company Cloudflare. The attacker has bombarded the Cloudflare edge with over 330 million requests at a speed of 17.2 million requests per second, making the attack three times larger than the previously... Read more
The largest-ever volumetric DDoS attack to date has been recorded on Thursday by web infrastructure... Read more
VULNERABILITIES
Should We Bow to USBSamurai?
1 year ago
Recently penetration testers working on vulnerabilities faced by industrial level environments on USB implants got a new tool added to their hacking backpack. USBsamurai, an HID(human interface device), has been introduced to the world in a Black Hat Arsenal held on 5th August 2021 by Luca Bongiorni, a security researcher.... Read more
Recently penetration testers working on vulnerabilities faced by industrial level environments on USB implants got... Read more
VULNERABILITIES
Proxy server vulnerability messing up with Exchange Server config
1 year ago
The system administrators thought ProxyShell vulnerability isn't a good reason to apply the July 2020 Microsoft Exchange security updates, but apparently, they found a second major security bug, nicknamed PROXYTOKEN. This vulnerability allows the attacker to bypass all the security authentications easily and make changes to the backend configuration of... Read more
The system administrators thought ProxyShell vulnerability isn't a good reason to apply the July 2020... Read more
RESEARCH AND DEVELOPMENT
Implementation of Cobalt Strike Beacon
1 year ago
This Monday, Researchers disclosed a newly discovered Linux and Windows enactment of Cobalt Strike Beacon, which actively set its sight on government, telecommunications, IT, and financial institutions worldwide. The yet-to-be-detected version of penetration testing tool, also code-named “Vermilion Strike,” has marked one of the rare Linux Ports, i.e., a... Read more
This Monday, Researchers disclosed a newly discovered Linux and Windows enactment of Cobalt Strike Beacon,... Read more
RESEARCH AND DEVELOPMENT
Google WAF bypassed by oversized POST requests
30 weeks ago
WAF is a web application firewall that provides web application security from malicious attacks such as SQL injection, DDOS, etc. But recently, Google’s WAF was bypassed using POST requests. This has been reported by the researchers at Kloudle (a security consultancy firm) woho were able to bypass Google Cloud Platform... Read more
WAF is a web application firewall that provides web application security from malicious attacks such... Read more