- 443
- 642 795
Rahul Singh Chauhan
India
Приєднався 25 вер 2013
Hey, my name is Rahul
If you are someone who's a beginner in Cybersecurity and want to crack CEH, Pentest+, OSCP, then make sure that you hit that subscribe button.
I post videos on what I learn, writeups on CTFs that I participate in.
Unlike other fields cybersecurity is a bit different. One has to make a one's own road map.
But what we can do is follow others who are in this path or who've already made it, so that we avoid the pit falls and accelerate your journey.
Cheers!!
If you are someone who's a beginner in Cybersecurity and want to crack CEH, Pentest+, OSCP, then make sure that you hit that subscribe button.
I post videos on what I learn, writeups on CTFs that I participate in.
Unlike other fields cybersecurity is a bit different. One has to make a one's own road map.
But what we can do is follow others who are in this path or who've already made it, so that we avoid the pit falls and accelerate your journey.
Cheers!!
Using Bycrypt for Hashing can lead to bypass if | Okta Advisory
References:
www.pureid.io/okta-password-bypass/
man.openbsd.org/crypt#Blowfish_crypt
www.pureid.io/okta-password-bypass/
man.openbsd.org/crypt#Blowfish_crypt
Переглядів: 13
Відео
Dependency Confusion with PoC
Переглядів 6116 годин тому
How to Exploit Dependency Confusion? Timestamp: 0:00 - Intro 0:56 - Theory 4:31 - PoC 6:38 - How to find these issues in wild 7:17 - Important Note Previous Video With DNS Exfil: ua-cam.com/video/dNGJrSbrW-c/v-deo.html
Creating a Burp Extension | Cyber Security Project
Переглядів 89День тому
Note: Apologies. I might have used the term libraries instead of methods in some instances. Download Jython: central.sonatype.com/artifact/org.python/jython-standalone/versions Burp APIs: portswigger.net/burp/extender/api/ Basic Methods: portswigger.net/burp/extender/api/burp/iburpextendercallbacks.html GitHub: github.com/rahulsinghinfosec/BurpPlugins/tree/master
Solving Bugcrowd'sTwitter Challenge | December 15, 2024
Переглядів 2814 днів тому
Here's the Challenge: x.com/Bugcrowd/status/1868328185315602869
Reverse Engineering Android Source Code | droids2 | picoCTF
Переглядів 7028 днів тому
Short video on how we can attempt to reverse engineer java source code of an android application. You can use the following tools: apktool, jadx, jadx-gui, jd-gui (for jar file), etc. Here, I've used jadx-gui, because, I find it a bit easy as it directly accepts apk files. In the upcoming videos, I'll show how you can take it a step further, and change the entire business logic of the android a...
Droid 1 | Android & Reverse Engineering | PicoCTF 2019
Переглядів 66Місяць тому
CTF Info: play.picoctf.org/practice?page=1&search=droid Timestamp: 0:00 - English 6:06 - Hindi #ctf #picoctf #android #pentesting
SIP Protocol | Video 1 | Network Assessment Series for Beginner |
Переглядів 84Місяць тому
Timeline: 0:00 - Intro 9:00 - Hindi Resources: nmap.org/nsedoc/scripts/ book.hacktricks.xyz/network-services-pentesting/pentesting-voip/basic-voip-protocols/sip-session-initiation-protocol
403 Bypass Techniques for Absolute Beginners
Переглядів 94Місяць тому
Some sites that you can refer: 1. book.hacktricks.xyz/network-services-pentesting/pentesting-web/403-and-401-bypasses 2. blog.detectify.com/industry-insights/common-nginx-misconfigurations-that-leave-your-web-server-ope-to-attack/
NoSQL Injection | Pico CTF | CTF For Beginners 2024
Переглядів 808Місяць тому
Timeline: Intro (English): 0:00 Hindi Version: 8:03 Want to try out the challenge: play.picoctf.org/practice/challenge/443?category=1&originalEvent=73&page=1 For information on NoSQL: portswigger.net/web-security/nosql-injection
Trickster | PicoCTF | Web Category | CTF For Beginners
Переглядів 1532 місяці тому
This is a good challenge for those learning upload restriction bypass. Link to the challenge - play.picoctf.org/practice/challenge/445
How to reverse Engineer web application through browser in real time? | Cybersecurity Videos
Переглядів 1714 місяці тому
How to reverse Engineer web application through browser in real time? | Cybersecurity Videos
PaperCutNG | CVE-2023-27350 | Authentication bypass and remote code execution
Переглядів 834 місяці тому
PaperCutNG | CVE-2023-27350 | Authentication bypass and remote code execution
CVE-2023-23752 | Code & Exploitation | Authentication Bypass
Переглядів 1744 місяці тому
CVE-2023-23752 | Code & Exploitation | Authentication Bypass
Targeting Low Hanging Fruits | Penetration Testing | Bug Bounty
Переглядів 2924 місяці тому
Targeting Low Hanging Fruits | Penetration Testing | Bug Bounty
Cyber security Project | Cloud Security | Beginners & Professionals
Переглядів 1,2 тис.5 місяців тому
Cyber security Project | Cloud Security | Beginners & Professionals
DFIR resources for Beginners | CTF, Blog Posts, Tools
Переглядів 415 місяців тому
DFIR resources for Beginners | CTF, Blog Posts, Tools
Attacking AI | Bypass Guardrails | Prompt Injection | AI/LLM Pentesting
Переглядів 2585 місяців тому
Attacking AI | Bypass Guardrails | Prompt Injection | AI/LLM Pentesting
Attacking AI | Indirect Prompt Injection | AI/LLM Pentesting
Переглядів 2165 місяців тому
Attacking AI | Indirect Prompt Injection | AI/LLM Pentesting
Attacking AI | Prompt Injection | Day 01
Переглядів 2715 місяців тому
Attacking AI | Prompt Injection | Day 01
Are UUID random? | Bug hunter made 12000 USD
Переглядів 1695 місяців тому
Are UUID random? | Bug hunter made 12000 USD
Cyber Security Project | Detecting Malicious URLs
Переглядів 2,8 тис.6 місяців тому
Cyber Security Project | Detecting Malicious URLs
HackPack CTF (LLM Edition) - Yellow Dog 1, 2 | CTF For Beginners
Переглядів 2578 місяців тому
HackPack CTF (LLM Edition) - Yellow Dog 1, 2 | CTF For Beginners
Dependency Confusion in 3 minutes with PoC
Переглядів 4409 місяців тому
Dependency Confusion in 3 minutes with PoC
Java Code Analysis | picoCTF 2023 | CTF FOr beginners
Переглядів 59411 місяців тому
Java Code Analysis | picoCTF 2023 | CTF FOr beginners
Malware Research | Yara | Practical - Hands - On Video
Переглядів 6011 місяців тому
Malware Research | Yara | Practical - Hands - On Video
Want to perform Malware Research? Try Yara | Theory 1
Переглядів 69Рік тому
Want to perform Malware Research? Try Yara | Theory 1
NBCTF | secret tunnel | CTF For beginners
Переглядів 130Рік тому
NBCTF | secret tunnel | CTF For beginners
Cyber Security Project | HTTP Traffic Sniffer | Beginners
Переглядів 262Рік тому
Cyber Security Project | HTTP Traffic Sniffer | Beginners
Hello ! Can i use it as my final year project . Question: Can you give me the reason for why owasp calculator can be used . I mean its Major benefits for this project and how it will affect the real world cases !
Yea you can use it. Paap risk calculator is used my a lot of people in the infosec community to calculate the risk rating/severity of issues/vulnerabilities that they find. It does have its flaws, but so does CVSS. You can find more info about it on ChatGPT or owasp risk calculator (there’s a dedicated website for it by owasp)
I wish you would show examples of you actually entering these guardrails bypasses into ChatGPT/GPT4o/Gemini etc to verify that they do indeed work, otherwise this is simply theorycrafting. There are some very good suggestions here, but a few seem like shots in the dark, and clearly were never tested. Regardless, thanks for the information and the effort.
most underrated channel ❤🙌
This video was really helpful! Can you put out a simulation for the same?
Thanks for the feedback. I realized the audio quality is pretty bad with this one. I'll try to make a new one with better visuals. What is that you mean by simulation btw? Is it how we can look for issues in web apps?
@@RahulSinghInfosec by simulation I meant to say injecting the malicious package into web apps and sites, and how to create said packages. I've been trying to inject an npm package into a dummy website but I'm facing issues. A similar walkthrough or simulation of your method seems to be the key!
@ you’ll need to upload your malicious package to npm. Wait for the victim to use it (could be instantaneous, or might take years). Npm, now, also passively scans the uploaded packages, so, yours might get removed in some days, unless you know how to hide the payload or if the payload is quite tricky to reverse engineer.
❤❤❤
thanks <3
Can you please provide the dns.cap file? Or give the link by uploading it in you G-Drive or in anyway.
Thanks for the feedback. Added in the description. Also, here (wiki.wireshark.org/SampleCaptures). Search for dns.cap in the webpage.
Im trying to learn this but it is a struggle. im curious on how one would find the email without having access to source code.
So, I think i might have explained in the video. You can try the $ne operator. You can put anything like $ne:”doesnotexisr@x.com”. Since, it’s ne operator, it would result in you being logged in
You use the $ne operator. Since you knew the email here, you use $eq
@hfoxhaxfox1841 That doesn't answer my question but thank you for trying to help. I'm sure I found a way to go about it now when I attempt to try the challenge again.
Look up ‘portswigger nosql’ injection. There are a lot of labs. That might help you with more hands on nosql injection
Omg, this cipher had me thinking I needed to utilize a frequency analysis in some way
atleast put the link of the blog article which you showed in the video looks like you are busy in promoting your own stuff
I’m curious: what did I promote? As for the feedback, thanks, I’ll consider it for future videos. Otherwise, these resources are just a google search away. Will help you in recon
@RahulSinghInfosec Glad you are curious & responsible I was talking about the affiliate/Social media Links in your description You should have added the website link which you showed in your video too so we can read & copy it from the website or should have atleast added the paylods in description that works too for copying 🙂
Thanks for noticing. It was a template that I copy pasted almost every time back in the day which I forgot to remove. I don’t do affiliates anymore.
gr8 video bro,but try to be consistent ,post more videos
Thank you for the feedback. I’ll try to search for lesser talked about topics
Hello sir , In the project there is "About me" . Can you please teach me how to do that.
Hey, You can copy the html source code (of the about me section) and replace the instances of my name with yours. Hope it’s helpful. :)
For which application did we generate a report is it IAM
So, it’ll end up generating the report for all the AWS services (ideally). so, it’ll be IAM, DDB, s3, and all the other services within AWS. But scout suite doesn’t support a few services such as AWS Lambda. so it’ll not spit out any misconfigurations related to lambda.
@RahulSinghInfosec For what did we generate the report in this video
It’s called configuration review. It’s done to see if the assets in the cloud are not misconfigured from a security perspective
Good video, can you explain how to get the buffer (264) using gdb(gef) or reading it in assembly 😢😂
Hey, it’s generally hit and trial. So, keep increasing the buffer till the point you get a segmentation fault. Generally, if we read other articles and walkthrough online, people use tools instead of doing this manually. (I don’t remember its name rn). If you are interested, You can probably find the name by reading a couple of walk through articles about buffer overflow
@@RahulSinghInfosec That sounds like a more proper way of doing it, but for ctfs in general I'm curious where you'd have to start looking to find where possible exploitable code is, or what they generally look life, learing rev eng and pwn is so interesting but writeups are still pretty difficult to understand lol. Thanks for the info though
@ agreed. But tbh bufferoverflows are not that common anymore, as people have stared shifting to memory safe languages like rust. If you want to learn, John Hammond videos could help. But to be efficient in a limited time window, these tools are def helpful
Thanks mate, you helped alot :)
x.com/AnhPhuNguyen1/status/1840786336992682409?
samcurry.net/hacking-kia
Bro can you help us with detection and notification on zero day attack project ?
Hey, looks like you are venturing into threat intel/notification services (or a domain similar to that). I’m sorry, I’ll not be able to help with that, but what I can tel you that there are a lot of businesses around this. You can see how they operate(try looking for info around this on GitHub). Hope this helps.
Can i make keylogger with phython?
yes you can. It's the easiest to make in python as compared to other languages.
en.wikipedia.org/wiki/Discard_Protocol
Bhaiya where do i find project links for source code
Hey, these are ideas based on projects that I’ve seen being used by various companies. They do it at a very large scale but we can mimic their basic structure. Though you might not find the exact open source implementation, you can try looking it up on GitHub. Or try to spend some time learning how these tools work and then integrate them using python or other scripts for your use. Hope this helps
$perm var = sperm var
84765 Renner Junctions
how to find the endpoint?
the endpoint is /.git. The host endpoint would be the domain you are testing.
Can you send IEEE paper for this project
IEEE paper? This is just a YT short on pentesting apps for learning mobile pentesting😅
Hey,I have actually commented under the prediction of a malicious URL project,i don't know how it came under this
"ieee malicious url detection" will take you to IEEE papers. Just to clarify, I didn't refer any IEEE/Research gate paper. This is purely out of curiosity that I wanted to try (and luckily found a medium post along with code)
@@RahulSinghInfosec okay thank you
Did not know about that (exploit;cat) that was interesting to me I did not know that... chef wuz here
i tried this also but it still not worked bypasses this type or payload also ..now what else can we try
Miller Brenda Robinson Michelle Hall Gary
Yeeeyy❤
What if there is no writing permission in shadow file?
There typically won’t be a write permission for the shadow file. In this case you’ll have to look for other avenues to perform priv esc
Whats the actual meaning of udm=14
No idea. It just appears to be a GET parameter with a backend logic
amazing
👍👍👍👍
Keep going, brother. I am watching your videos every day and researching more about what you teach.
Thanks man!! Appreciate the feedback. More interesting topic and test cases coming your way. 😀
@@RahulSinghInfosec I will be waiting
Whats this?
MacBooks with Touch Bar allow you to scroll through the advt!!
@@RahulSinghInfosec oh
Why it's heavier then others
www.qubes-os.org/doc/system-requirements/
can you attach the codes?
Thanks for pointing that out. Updated the description with the post and GitHub link.
How to add these in resume ?!
You can just add their headings in your resume under projects. And write a line or two about them
Hi Rahul, would you like to share this git URL??
Okay, so what you can do is type ‘payload all the things’ and you’ll get to the GitHub repo. From there you can just scroll through multiple payload types
Goood 🎉
Informative ❤
is it DOM XSS sir ?
Yup
Please help me regarding forensic project. I'm fresher
Hey, DFIR is quite tricky. I'll try to explore this one. But from what I understand, there are already a lot of tools available in the market. You can 1) Add features to those tools (most of them are open source) 2) Try your hands on compromised machines and create a report
I like your project Idea
How to design a project proposal
Your projects are really interesting.
I was trying to get user.jpg using the Attackbox IP not the room machine IP.
Thx very helpful❤
Thanks bro!