Open in app

Sign In

Write

Sign In

Shriyans Sudhi
Shriyans Sudhi

140 Followers

Home

About

Published in

InfoSec Write-ups

·Pinned

Monitoring your targets for bug bounties

(Pro-tip: use the text to speech feature of medium for an awesome experience) — Hi there, This is gonna be one of the favorite articles I've ever written. Automation, that's a pretty familiar word. Maybe you've heard people telling that they got some bounties with just using some simple automation. So in this article, I will be discussing about the bug bounty automation. Requirements …

Bug Bounty

6 min read

Monitoring your targets for bug bounties
Monitoring your targets for bug bounties
Bug Bounty

6 min read


Published in

InfoSec Write-ups

·4 days ago

Automated Monitoring + Time = Bug, the bug on HackerOne Target (8x8)

Hi there, In this article I will discuss how my automation machine found a bug in one of the HackerOne program. Since the program is public and the report is also disclosed, I will here are basic info:- Program name: 8x8 (and yes, they have VDP + BBP as well) …

Bug Bounty

3 min read

Automated Monitoring + Time = Bug, the bug on HackerOne Target (8x8)
Automated Monitoring + Time = Bug, the bug on HackerOne Target (8x8)
Bug Bounty

3 min read


Published in

InfoSec Write-ups

·Feb 1

Wardrive without a GPS module and WiFi adapter that supports monitor mode, but a Raspberry Pi

Hi there, Hope you are well. In this article, I will describe how you can plot all the WiFi networks in your area on map. This article will contain the following:- Backstory Hardware requirements Installing app on your mobile phone The code You can read about what wardriving is on…

Wardrive

6 min read

Wardrive without a GPS module and WiFi adapter that supports monitor mode, but a Raspberry Pi
Wardrive without a GPS module and WiFi adapter that supports monitor mode, but a Raspberry Pi
Wardrive

6 min read


Published in

InfoSec Write-ups

·Dec 30, 2022

The subdomain monitoring bot — Setting up your bug bounty scripts with Python and Bash

Hi there, Automation is very interesting things, and if done in a right manner, it is more interesting. But writing automation scripts is the most important thing for that. So, in this article, we’ll be discussing about writing automation scripts in Python and Bash for your VPS server (or maybe…

Bug Bounty

8 min read

Setting up your bug bounty scripts with Python and Bash
Setting up your bug bounty scripts with Python and Bash
Bug Bounty

8 min read


Published in

InfoSec Write-ups

·Apr 4, 2022

Log Poisoning — Inject payloads in logs

Logs… These are the files, in which all the activities on a server are stored. These are used for monitoring, troubleshooting, fixing bugs (vulnerabilities), and many more things. Activities are logged for different things, e.g. for a proxy, for a web server, etc. …

Logs

4 min read

Log Poisoning — Inject payloads in logs
Log Poisoning — Inject payloads in logs
Logs

4 min read


Mar 22, 2022

VishwaCTF-22 => John the rocker (Cryptography)

Challenge Info Description: None Files: https://github.com/shriyanss/VishwaCTF-22/blob/main/idrsa.id_rsa.docx Solution This is an easy cryptography challenge. In this challenge, we’ve got a file, which is a SSH private key. So, the most probable things are:- Get an SSH server Crack the key As the name suggests, we should use John the Ripper (it is a hash…

Vishwactf

2 min read

VishwaCTF-22 => John the rocker (Cryptography)
VishwaCTF-22 => John the rocker (Cryptography)
Vishwactf

2 min read


Mar 22, 2022

VishwaCTF-22 => Overcook (Reverse Engineering)

Challenge Info Description: Alright, this time you’ll need to control some numerical representations. Can you get the flag from this program? Solution So, as usual, opening it in Ghidra Code Analyzer and checking its functions

Vishwactf

2 min read

VishwaCTF-22 => Overcook (Reverse Engineering)
VishwaCTF-22 => Overcook (Reverse Engineering)
Vishwactf

2 min read


Mar 22, 2022

VishwaCTF-22 => “Stock Bot” (Web)

Challenge Info Description: We have our online shop of computer related accessories. So for easy customer interaction we have made a stock bot which will give you how many units of enlisted products are available URL: https://st0ck-b0t.vishwactf.com/ Solution When we open the webpage, we would get a chat-bot

Vishwactf

3 min read

VishwaCTF-22 => “Stock Bot” (Web)
VishwaCTF-22 => “Stock Bot” (Web)
Vishwactf

3 min read


Mar 22, 2022

VishwaCTF-22 => “My Useless Website”

Challenge Info Description: I made this website having simple authentication used in it. But unfortunately I forgot the credentials. Can you help me to find the correct one ?? URL: https://my-us3l355-w3b51t3.vishwactf.com/ Solution As the description says, a person created a basic authentication and he forgot its user and password. …

Vishwactf

2 min read

VishwaCTF-22 => “My Useless Website”
VishwaCTF-22 => “My Useless Website”
Vishwactf

2 min read


Mar 22, 2022

VishwaCTF-22 => “Hey Buddy!” (Web)

Challenge Info Description: Hey Buddy, Give me your name I will display your name on my website. Yes exactly, there is nothing in this website. URL: https://h3y-buddy.vishwactf.com/ Solution The challenge says that when you will enter your name, it will simply display it in the site. Okay! But now thinking, what the backend…

Vishwactf

2 min read

VishwaCTF-22 => “Hey Buddy!” (Web)
VishwaCTF-22 => “Hey Buddy!” (Web)
Vishwactf

2 min read

Shriyans Sudhi

Shriyans Sudhi

140 Followers

<broken code>

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams