Open in app

Sign In

Write

Sign In

Mayank Pandey
Mayank Pandey

196 Followers

Home

About

Published in

InfoSec Write-ups

·Jan 9

Beginners Guide to Container Security

Learn How to Hack Into Containers and understand how they actually work. — Containerization is a popular way to deploy applications, many companies use this way to run their services, As a Security Enthusiast or Red Teamer it becomes necessary to know how containers work and how to break into them. …

Cybersecurity

9 min read

Beginners Guide to Container Security
Beginners Guide to Container Security
Cybersecurity

9 min read


Published in

InfoSec Write-ups

·Aug 12, 2022

Configuring TOR with Python

Mask Your IP Address using a Python Script — If you ever built a web scrapper then you must have faced the issue of being blocked by web servers for generating too many requests, or you Just wanted to hide your Real IP Address and automate your scripts. In this article, I will explain how to configure TOR on…

Python

4 min read

Configuring TOR with Python
Configuring TOR with Python
Python

4 min read


Published in

InfoSec Write-ups

·Mar 31, 2022

CloudSek EWYL 2022 CTF

Solving a Harry Potter Themed CTF — This was a “Harry Potter” themed CTF containing challenges from Multiple areas of Web security like Template Injection and Code Review. This Challenge was hosted by CloudSEK as a part of the EWYL-2022 Program. In this report, I have explained in detail how I solved the CTF. Initial Recon I started the…

Hacking

7 min read

CloudSek EWYL 2022 CTF
CloudSek EWYL 2022 CTF
Hacking

7 min read


Published in

Python in Plain English

·Feb 7, 2022

Create a Multithreaded Directory Bruteforcer

Understanding Multithreading in Python for Beginners — If you have started in Coding or Use Programming tools you might have heard the terms like “Multiprocessing” or“Multithreading”, if you haven't yet learned these things then this will help you comprehend these wonderful programming concepts in an uncomplicated way. In this article, we will only discuss Multithreading. So let's…

Cybersecurity

7 min read

Create a Multithreaded Directory Bruteforcer
Create a Multithreaded Directory Bruteforcer
Cybersecurity

7 min read


Published in

InfoSec Write-ups

·Dec 22, 2021

How “assertions” can get you Hacked !!

A deep dive into the assert() function and ways to exploit it! — Hello Fellow Hackers and developers, It’s been a while since I posted any blog here. Today I will be discussing Coding+Hacking, especially about a feature present in almost every High-Level Language known as “assertion”. You will get to know What are assert() functions and different ways to exploit them in…

Hacking

7 min read

How “assertions” can get you Hacked !!
How “assertions” can get you Hacked !!
Hacking

7 min read


Published in

InfoSec Write-ups

·Jul 29, 2021

RazorBlack-Walkthrough [THM]

Learn How to attack Windows Active Directory through a CTF — Description RazorBlack is a Medium Level Room on TryHackMe. It has a rather very interesting Description “These guys call themselves hackers. Can you show them who's the boss ?? ” The goal of this Challenge is to make you familiar with Active Directory Enumeration and Exploitation. …

Cybersecurity

9 min read

RazorBlack-Walkthrough [THM]
RazorBlack-Walkthrough [THM]
Cybersecurity

9 min read


Published in

InfoSec Write-ups

·Jul 16, 2021

BluePrint Walkthrough[❌Metasploit ❌]

Solving A Windows Machine On TryHackMe without Metasploit. —

Tryhackme

7 min read

BluePrint Walkthrough[❌Metasploit ❌]
BluePrint Walkthrough[❌Metasploit ❌]
Tryhackme

7 min read


Published in

InfoSec Write-ups

·Jul 6, 2021

Hacking Microservices For Fun and Bounty

Understand How Microservices Work and Ways to hack it. — Microservices are catching a lot of heat these days, they are on the verge of going mainstream, according to a recent survey from Nginx, 36 percent of enterprises surveyed are currently using microservices, with another 26 percent in the research phase. But what exactly is a microservices architecture. From a…

Bug Bounty

5 min read

Hacking Microservices For Fun and Bounty
Hacking Microservices For Fun and Bounty
Bug Bounty

5 min read


Published in

InfoSec Write-ups

·Mar 18, 2021

An Interesting Account Takeover!!

IDOR and weak encryption led to a Full account takeover. — Hello, my fellow hackers. I am Mayank Pandey, a Bug Hunter, and an Aspiring Red Teamer. This is my first ever write-up for any Bug so if I make any mistake then ignore it. Now coming straight to the interesting part. Recently I was reading about many Account Takeovers on…

Hacking

4 min read

An Interesting Account Takeover!
An Interesting Account Takeover!
Hacking

4 min read

Mayank Pandey

Mayank Pandey

196 Followers

A Budding Security Nerd

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams