Rahul Singh Chauhan
Rahul Singh Chauhan
  • 443
  • 642 795

Відео

Dependency Confusion with PoC
Переглядів 6116 годин тому
How to Exploit Dependency Confusion? Timestamp: 0:00 - Intro 0:56 - Theory 4:31 - PoC 6:38 - How to find these issues in wild 7:17 - Important Note Previous Video With DNS Exfil: ua-cam.com/video/dNGJrSbrW-c/v-deo.html
Creating a Burp Extension | Cyber Security Project
Переглядів 89День тому
Note: Apologies. I might have used the term libraries instead of methods in some instances. Download Jython: central.sonatype.com/artifact/org.python/jython-standalone/versions Burp APIs: portswigger.net/burp/extender/api/ Basic Methods: portswigger.net/burp/extender/api/burp/iburpextendercallbacks.html GitHub: github.com/rahulsinghinfosec/BurpPlugins/tree/master
Solving Bugcrowd'sTwitter Challenge | December 15, 2024
Переглядів 2814 днів тому
Here's the Challenge: x.com/Bugcrowd/status/1868328185315602869
Reverse Engineering Android Source Code | droids2 | picoCTF
Переглядів 7028 днів тому
Short video on how we can attempt to reverse engineer java source code of an android application. You can use the following tools: apktool, jadx, jadx-gui, jd-gui (for jar file), etc. Here, I've used jadx-gui, because, I find it a bit easy as it directly accepts apk files. In the upcoming videos, I'll show how you can take it a step further, and change the entire business logic of the android a...
Droid 1 | Android & Reverse Engineering | PicoCTF 2019
Переглядів 66Місяць тому
CTF Info: play.picoctf.org/practice?page=1&search=droid Timestamp: 0:00 - English 6:06 - Hindi #ctf #picoctf #android #pentesting
SIP Protocol | Video 1 | Network Assessment Series for Beginner |
Переглядів 84Місяць тому
Timeline: 0:00 - Intro 9:00 - Hindi Resources: nmap.org/nsedoc/scripts/ book.hacktricks.xyz/network-services-pentesting/pentesting-voip/basic-voip-protocols/sip-session-initiation-protocol
403 Bypass Techniques for Absolute Beginners
Переглядів 94Місяць тому
Some sites that you can refer: 1. book.hacktricks.xyz/network-services-pentesting/pentesting-web/403-and-401-bypasses 2. blog.detectify.com/industry-insights/common-nginx-misconfigurations-that-leave-your-web-server-ope-to-attack/
NoSQL Injection | Pico CTF | CTF For Beginners 2024
Переглядів 808Місяць тому
Timeline: Intro (English): 0:00 Hindi Version: 8:03 Want to try out the challenge: play.picoctf.org/practice/challenge/443?category=1&originalEvent=73&page=1 For information on NoSQL: portswigger.net/web-security/nosql-injection
Trickster | PicoCTF | Web Category | CTF For Beginners
Переглядів 1532 місяці тому
This is a good challenge for those learning upload restriction bypass. Link to the challenge - play.picoctf.org/practice/challenge/445
How to reverse Engineer web application through browser in real time? | Cybersecurity Videos
Переглядів 1714 місяці тому
How to reverse Engineer web application through browser in real time? | Cybersecurity Videos
PaperCutNG | CVE-2023-27350 | Authentication bypass and remote code execution
Переглядів 834 місяці тому
PaperCutNG | CVE-2023-27350 | Authentication bypass and remote code execution
CVE-2023-23752 | Code & Exploitation | Authentication Bypass
Переглядів 1744 місяці тому
CVE-2023-23752 | Code & Exploitation | Authentication Bypass
Targeting Low Hanging Fruits | Penetration Testing | Bug Bounty
Переглядів 2924 місяці тому
Targeting Low Hanging Fruits | Penetration Testing | Bug Bounty
Cyber security Project | Cloud Security | Beginners & Professionals
Переглядів 1,2 тис.5 місяців тому
Cyber security Project | Cloud Security | Beginners & Professionals
DFIR resources for Beginners | CTF, Blog Posts, Tools
Переглядів 415 місяців тому
DFIR resources for Beginners | CTF, Blog Posts, Tools
Attacking AI | Bypass Guardrails | Prompt Injection | AI/LLM Pentesting
Переглядів 2585 місяців тому
Attacking AI | Bypass Guardrails | Prompt Injection | AI/LLM Pentesting
Attacking AI | Indirect Prompt Injection | AI/LLM Pentesting
Переглядів 2165 місяців тому
Attacking AI | Indirect Prompt Injection | AI/LLM Pentesting
Attacking AI | Prompt Injection | Day 01
Переглядів 2715 місяців тому
Attacking AI | Prompt Injection | Day 01
Are UUID random? | Bug hunter made 12000 USD
Переглядів 1695 місяців тому
Are UUID random? | Bug hunter made 12000 USD
Cyber Security Project | Detecting Malicious URLs
Переглядів 2,8 тис.6 місяців тому
Cyber Security Project | Detecting Malicious URLs
HackPack CTF (LLM Edition) - Yellow Dog 1, 2 | CTF For Beginners
Переглядів 2578 місяців тому
HackPack CTF (LLM Edition) - Yellow Dog 1, 2 | CTF For Beginners
Pentest GraphQL | Video 1
Переглядів 1658 місяців тому
Pentest GraphQL | Video 1
Dependency Confusion in 3 minutes with PoC
Переглядів 4409 місяців тому
Dependency Confusion in 3 minutes with PoC
Java Code Analysis | picoCTF 2023 | CTF FOr beginners
Переглядів 59411 місяців тому
Java Code Analysis | picoCTF 2023 | CTF FOr beginners
Malware Research | Yara | Practical - Hands - On Video
Переглядів 6011 місяців тому
Malware Research | Yara | Practical - Hands - On Video
Yara | Malware Research | Theory 2
Переглядів 65Рік тому
Yara | Malware Research | Theory 2
Want to perform Malware Research? Try Yara | Theory 1
Переглядів 69Рік тому
Want to perform Malware Research? Try Yara | Theory 1
NBCTF | secret tunnel | CTF For beginners
Переглядів 130Рік тому
NBCTF | secret tunnel | CTF For beginners
Cyber Security Project | HTTP Traffic Sniffer | Beginners
Переглядів 262Рік тому
Cyber Security Project | HTTP Traffic Sniffer | Beginners

КОМЕНТАРІ

  • @pratibhasalunkhe996
    @pratibhasalunkhe996 12 годин тому

    Hello ! Can i use it as my final year project . Question: Can you give me the reason for why owasp calculator can be used . I mean its Major benefits for this project and how it will affect the real world cases !

    • @RahulSinghInfosec
      @RahulSinghInfosec 9 годин тому

      Yea you can use it. Paap risk calculator is used my a lot of people in the infosec community to calculate the risk rating/severity of issues/vulnerabilities that they find. It does have its flaws, but so does CVSS. You can find more info about it on ChatGPT or owasp risk calculator (there’s a dedicated website for it by owasp)

  • @insidetheunicorn
    @insidetheunicorn 7 днів тому

    I wish you would show examples of you actually entering these guardrails bypasses into ChatGPT/GPT4o/Gemini etc to verify that they do indeed work, otherwise this is simply theorycrafting. There are some very good suggestions here, but a few seem like shots in the dark, and clearly were never tested. Regardless, thanks for the information and the effort.

  • @Akshay-te8pm
    @Akshay-te8pm 12 днів тому

    most underrated channel ❤🙌

  • @PrishaKaushik-x9g
    @PrishaKaushik-x9g 14 днів тому

    This video was really helpful! Can you put out a simulation for the same?

    • @RahulSinghInfosec
      @RahulSinghInfosec 13 днів тому

      Thanks for the feedback. I realized the audio quality is pretty bad with this one. I'll try to make a new one with better visuals. What is that you mean by simulation btw? Is it how we can look for issues in web apps?

    • @PrishaKaushik-x9g
      @PrishaKaushik-x9g 12 днів тому

      @@RahulSinghInfosec by simulation I meant to say injecting the malicious package into web apps and sites, and how to create said packages. I've been trying to inject an npm package into a dummy website but I'm facing issues. A similar walkthrough or simulation of your method seems to be the key!

    • @RahulSinghInfosec
      @RahulSinghInfosec 12 днів тому

      @ you’ll need to upload your malicious package to npm. Wait for the victim to use it (could be instantaneous, or might take years). Npm, now, also passively scans the uploaded packages, so, yours might get removed in some days, unless you know how to hide the payload or if the payload is quite tricky to reverse engineer.

  • @AnjaliThakur7376
    @AnjaliThakur7376 Місяць тому

    ❤❤❤

  • @BaoTran-vg8ud
    @BaoTran-vg8ud Місяць тому

    thanks <3

  • @arindam_03
    @arindam_03 Місяць тому

    Can you please provide the dns.cap file? Or give the link by uploading it in you G-Drive or in anyway.

    • @RahulSinghInfosec
      @RahulSinghInfosec Місяць тому

      Thanks for the feedback. Added in the description. Also, here (wiki.wireshark.org/SampleCaptures). Search for dns.cap in the webpage.

  • @geealex7990
    @geealex7990 Місяць тому

    Im trying to learn this but it is a struggle. im curious on how one would find the email without having access to source code.

    • @RahulSinghInfosec
      @RahulSinghInfosec Місяць тому

      So, I think i might have explained in the video. You can try the $ne operator. You can put anything like $ne:”doesnotexisr@x.com”. Since, it’s ne operator, it would result in you being logged in

    • @hfoxhaxfox1841
      @hfoxhaxfox1841 Місяць тому

      You use the $ne operator. Since you knew the email here, you use $eq

    • @geealex7990
      @geealex7990 Місяць тому

      @hfoxhaxfox1841 That doesn't answer my question but thank you for trying to help. I'm sure I found a way to go about it now when I attempt to try the challenge again.

    • @RahulSinghInfosec
      @RahulSinghInfosec Місяць тому

      Look up ‘portswigger nosql’ injection. There are a lot of labs. That might help you with more hands on nosql injection

  • @Roeclean
    @Roeclean Місяць тому

    Omg, this cipher had me thinking I needed to utilize a frequency analysis in some way

  • @om3726
    @om3726 Місяць тому

    atleast put the link of the blog article which you showed in the video looks like you are busy in promoting your own stuff

    • @RahulSinghInfosec
      @RahulSinghInfosec Місяць тому

      I’m curious: what did I promote? As for the feedback, thanks, I’ll consider it for future videos. Otherwise, these resources are just a google search away. Will help you in recon

    • @om3726
      @om3726 Місяць тому

      @RahulSinghInfosec Glad you are curious & responsible I was talking about the affiliate/Social media Links in your description You should have added the website link which you showed in your video too so we can read & copy it from the website or should have atleast added the paylods in description that works too for copying 🙂

    • @RahulSinghInfosec
      @RahulSinghInfosec Місяць тому

      Thanks for noticing. It was a template that I copy pasted almost every time back in the day which I forgot to remove. I don’t do affiliates anymore.

  • @abhinavbansal-cc8gr
    @abhinavbansal-cc8gr Місяць тому

    gr8 video bro,but try to be consistent ,post more videos

    • @RahulSinghInfosec
      @RahulSinghInfosec Місяць тому

      Thank you for the feedback. I’ll try to search for lesser talked about topics

  • @Aathmika145
    @Aathmika145 Місяць тому

    Hello sir , In the project there is "About me" . Can you please teach me how to do that.

    • @RahulSinghInfosec
      @RahulSinghInfosec Місяць тому

      Hey, You can copy the html source code (of the about me section) and replace the instances of my name with yours. Hope it’s helpful. :)

  • @sanjanasree4672
    @sanjanasree4672 2 місяці тому

    For which application did we generate a report is it IAM

    • @RahulSinghInfosec
      @RahulSinghInfosec 2 місяці тому

      So, it’ll end up generating the report for all the AWS services (ideally). so, it’ll be IAM, DDB, s3, and all the other services within AWS. But scout suite doesn’t support a few services such as AWS Lambda. so it’ll not spit out any misconfigurations related to lambda.

    • @sanjanasree4672
      @sanjanasree4672 2 місяці тому

      @RahulSinghInfosec For what did we generate the report in this video

    • @RahulSinghInfosec
      @RahulSinghInfosec 2 місяці тому

      It’s called configuration review. It’s done to see if the assets in the cloud are not misconfigured from a security perspective

  • @wolfleader2
    @wolfleader2 2 місяці тому

    Good video, can you explain how to get the buffer (264) using gdb(gef) or reading it in assembly 😢😂

    • @RahulSinghInfosec
      @RahulSinghInfosec 2 місяці тому

      Hey, it’s generally hit and trial. So, keep increasing the buffer till the point you get a segmentation fault. Generally, if we read other articles and walkthrough online, people use tools instead of doing this manually. (I don’t remember its name rn). If you are interested, You can probably find the name by reading a couple of walk through articles about buffer overflow

    • @wolfleader2
      @wolfleader2 Місяць тому

      @@RahulSinghInfosec That sounds like a more proper way of doing it, but for ctfs in general I'm curious where you'd have to start looking to find where possible exploitable code is, or what they generally look life, learing rev eng and pwn is so interesting but writeups are still pretty difficult to understand lol. Thanks for the info though

    • @RahulSinghInfosec
      @RahulSinghInfosec Місяць тому

      @ agreed. But tbh bufferoverflows are not that common anymore, as people have stared shifting to memory safe languages like rust. If you want to learn, John Hammond videos could help. But to be efficient in a limited time window, these tools are def helpful

  • @oldmate4140
    @oldmate4140 2 місяці тому

    Thanks mate, you helped alot :)

  • @RahulSinghInfosec
    @RahulSinghInfosec 2 місяці тому

    x.com/AnhPhuNguyen1/status/1840786336992682409?

  • @RahulSinghInfosec
    @RahulSinghInfosec 3 місяці тому

    samcurry.net/hacking-kia

  • @usmanrockzz2399
    @usmanrockzz2399 3 місяці тому

    Bro can you help us with detection and notification on zero day attack project ?

    • @RahulSinghInfosec
      @RahulSinghInfosec 3 місяці тому

      Hey, looks like you are venturing into threat intel/notification services (or a domain similar to that). I’m sorry, I’ll not be able to help with that, but what I can tel you that there are a lot of businesses around this. You can see how they operate(try looking for info around this on GitHub). Hope this helps.

  • @AnkitaDas-x5x
    @AnkitaDas-x5x 3 місяці тому

    Can i make keylogger with phython?

    • @RahulSinghInfosec
      @RahulSinghInfosec 3 місяці тому

      yes you can. It's the easiest to make in python as compared to other languages.

  • @RahulSinghInfosec
    @RahulSinghInfosec 3 місяці тому

    en.wikipedia.org/wiki/Discard_Protocol

  • @mayankpathak4255
    @mayankpathak4255 3 місяці тому

    Bhaiya where do i find project links for source code

    • @RahulSinghInfosec
      @RahulSinghInfosec 3 місяці тому

      Hey, these are ideas based on projects that I’ve seen being used by various companies. They do it at a very large scale but we can mimic their basic structure. Though you might not find the exact open source implementation, you can try looking it up on GitHub. Or try to spend some time learning how these tools work and then integrate them using python or other scripts for your use. Hope this helps

  • @gamermashoo9756
    @gamermashoo9756 3 місяці тому

    $perm var = sperm var

  • @StracheyNovia
    @StracheyNovia 3 місяці тому

    84765 Renner Junctions

  • @BLUR7777
    @BLUR7777 3 місяці тому

    how to find the endpoint?

    • @RahulSinghInfosec
      @RahulSinghInfosec 3 місяці тому

      the endpoint is /.git. The host endpoint would be the domain you are testing.

  • @shravyaullal167
    @shravyaullal167 3 місяці тому

    Can you send IEEE paper for this project

    • @RahulSinghInfosec
      @RahulSinghInfosec 3 місяці тому

      IEEE paper? This is just a YT short on pentesting apps for learning mobile pentesting😅

    • @shravyaullal167
      @shravyaullal167 3 місяці тому

      Hey,I have actually commented under the prediction of a malicious URL project,i don't know how it came under this

    • @RahulSinghInfosec
      @RahulSinghInfosec 3 місяці тому

      "ieee malicious url detection" will take you to IEEE papers. Just to clarify, I didn't refer any IEEE/Research gate paper. This is purely out of curiosity that I wanted to try (and luckily found a medium post along with code)

    • @shravyaullal167
      @shravyaullal167 3 місяці тому

      @@RahulSinghInfosec okay thank you

  • @Macj707
    @Macj707 3 місяці тому

    Did not know about that (exploit;cat) that was interesting to me I did not know that... chef wuz here

  • @vasudhagupta-gh3dh
    @vasudhagupta-gh3dh 4 місяці тому

    i tried this also but it still not worked bypasses this type or payload also ..now what else can we try

  • @AliEkerci-p9b
    @AliEkerci-p9b 4 місяці тому

    Miller Brenda Robinson Michelle Hall Gary

  • @StabilizerTech
    @StabilizerTech 4 місяці тому

    Yeeeyy❤

  • @_ArfatFarooq
    @_ArfatFarooq 4 місяці тому

    What if there is no writing permission in shadow file?

    • @RahulSinghInfosec
      @RahulSinghInfosec 4 місяці тому

      There typically won’t be a write permission for the shadow file. In this case you’ll have to look for other avenues to perform priv esc

  • @Akshay-te8pm
    @Akshay-te8pm 4 місяці тому

    Whats the actual meaning of udm=14

    • @RahulSinghInfosec
      @RahulSinghInfosec 4 місяці тому

      No idea. It just appears to be a GET parameter with a backend logic

  • @HackSparo
    @HackSparo 5 місяців тому

    amazing

  • @Anuj_Singh_Gusain
    @Anuj_Singh_Gusain 5 місяців тому

    👍👍👍👍

  • @wrench2474
    @wrench2474 5 місяців тому

    Keep going, brother. I am watching your videos every day and researching more about what you teach.

    • @RahulSinghInfosec
      @RahulSinghInfosec 5 місяців тому

      Thanks man!! Appreciate the feedback. More interesting topic and test cases coming your way. 😀

    • @wrench2474
      @wrench2474 5 місяців тому

      @@RahulSinghInfosec I will be waiting

  • @Akshay-te8pm
    @Akshay-te8pm 5 місяців тому

    Whats this?

    • @RahulSinghInfosec
      @RahulSinghInfosec 5 місяців тому

      MacBooks with Touch Bar allow you to scroll through the advt!!

    • @Akshay-te8pm
      @Akshay-te8pm 5 місяців тому

      @@RahulSinghInfosec oh

  • @Akshay-te8pm
    @Akshay-te8pm 5 місяців тому

    Why it's heavier then others

  • @ShreyaBarnwal-zo2ui
    @ShreyaBarnwal-zo2ui 5 місяців тому

    can you attach the codes?

    • @RahulSinghInfosec
      @RahulSinghInfosec 5 місяців тому

      Thanks for pointing that out. Updated the description with the post and GitHub link.

  • @Ready_to_skip
    @Ready_to_skip 5 місяців тому

    How to add these in resume ?!

    • @RahulSinghInfosec
      @RahulSinghInfosec 5 місяців тому

      You can just add their headings in your resume under projects. And write a line or two about them

  • @Masumkazibd
    @Masumkazibd 5 місяців тому

    Hi Rahul, would you like to share this git URL??

    • @RahulSinghInfosec
      @RahulSinghInfosec 5 місяців тому

      Okay, so what you can do is type ‘payload all the things’ and you’ll get to the GitHub repo. From there you can just scroll through multiple payload types

  • @Username8281
    @Username8281 5 місяців тому

    Goood 🎉

  • @Akshay-te8pm
    @Akshay-te8pm 5 місяців тому

    Informative ❤

  • @elzaghory4212
    @elzaghory4212 6 місяців тому

    is it DOM XSS sir ?

  • @erashandilya2256
    @erashandilya2256 6 місяців тому

    Please help me regarding forensic project. I'm fresher

    • @RahulSinghInfosec
      @RahulSinghInfosec 6 місяців тому

      Hey, DFIR is quite tricky. I'll try to explore this one. But from what I understand, there are already a lot of tools available in the market. You can 1) Add features to those tools (most of them are open source) 2) Try your hands on compromised machines and create a report

  • @erashandilya2256
    @erashandilya2256 6 місяців тому

    I like your project Idea

  • @PeaceNowangye
    @PeaceNowangye 6 місяців тому

    How to design a project proposal

  • @Sourav_Debnath
    @Sourav_Debnath 6 місяців тому

    Your projects are really interesting.

  • @user-eh1vi3jz1c
    @user-eh1vi3jz1c 6 місяців тому

    I was trying to get user.jpg using the Attackbox IP not the room machine IP.

  • @JoshTWO-ml5mo
    @JoshTWO-ml5mo 7 місяців тому

    Thx very helpful❤

  • @KnightWicho
    @KnightWicho 7 місяців тому

    Thanks bro!