Open in app

Sign In

Write

Sign In

Mukilan Baskaran
Mukilan Baskaran

471 Followers

Home

About

Published in

InfoSec Write-ups

·Pinned

How I found the Clickjacking bug

Bug Bounty Writeup — Welcome back amazing another important topic on how I found out clickjacking bug. Initially after doing the recon phase did some SQL injection, XSS, XXE, and SSRF but I couldn’t find anything interesting. After I looked for any headers missed or not and I came to know X-Frame-Options missed out. …

Bug Bounty

2 min read

How I found the Clickjacking bug
How I found the Clickjacking bug
Bug Bounty

2 min read


Published in

InfoSec Write-ups

·Pinned

Bolt — TryHackMe

Writeup — Welcome back amazing hackers, in this blog, I am going to show you an interesting walkthrough writeup that might be useful in bug bounty findings. let's get into the writeup, firstly deploy the machine after that making some Nmap scan to find the useful information. From the Nmap result, I…

Bug Bounty

3 min read

Bolt — TryHackMe
Bolt — TryHackMe
Bug Bounty

3 min read


Pinned

Walking an Application -TryHackme

Welcome back amazing fellow hackers in this blog you are gonna see how to walk through websites manually for security issues in websites by inbuilt tools in the browser. We are gonna see a list of inbuilt tools that we are gonna walk through on browsers which are : View…

Walking An Application

2 min read

Walking An Application

2 min read


Published in

InfoSec Write-ups

·Pinned

SQL Injection JR. Pentester -TryHackMe

Hi, amazing hackers in this story you are gonna how to what is SQL injections and how to find them in different types. SQL injection is also defined as SQLi, an attack scenario on an application web server database by executing malicious queries in the database which results in stealing…

Tryhackme

4 min read

SQL Injection JR. Pentester -TryHackMe
SQL Injection JR. Pentester -TryHackMe
Tryhackme

4 min read


Pinned

TryHackme Learn and win prizes #2

TryHackme provides amazing cybersecurity contents day by day you can learn and practice more to enrich the skills. It gives anyone who is interested to enter cybersecurity it is a right platform and you can more updates and success stories of those who succeed in this field. …

Pentester

1 min read

Pentester

1 min read


Published in

System Weakness

·Mar 22

New blog for network security and ethical hacking

Are you interested in computer networks and ethical hacking? Do you want to learn more about the latest tools and techniques used by cybersecurity professionals to protect networks from cyber attacks? Look no further! I have just launched my new blog on Yo.fan, …

Networking

2 min read

Networking

2 min read


Published in

InfoSec Write-ups

·Nov 29, 2022

Recon

The Art of Gathering Information — The motive of recon is the more you know about your target and the possibility of attack is more. In red team operation, you must know what company you going to gather information from. To gather information there are 2 types of recon one is passive recon and active recon…

Recon

4 min read

Recon
Recon
Recon

4 min read


Published in

InfoSec Write-ups

·Nov 2, 2022

The Complete Guide to PortSwigger Directory Traversal and How to Prevent It

PortSwigger is a company that specializes in vulnerability research and development of security tools. It is a company which has been instrumental in the development of the Burp Suite, an integrated platform for web application security testing. In this tutorial, we will be looking at PortSwigger Directory Traversal and how…

Bug Bounty

4 min read

The Complete Guide to PortSwigger Directory Traversal and How to Prevent It
The Complete Guide to PortSwigger Directory Traversal and How to Prevent It
Bug Bounty

4 min read


Sep 17, 2022

Ping, Traceroute, and subnet mask

Ping: The Ping command is used to find whether the host is alive or not. example: ping example.com In order to wait for 2 seconds and then send packets use: ping -i 2 example.com If you want to send a specific number of packets then use the command ping -c 5 example.com If you want to ping the private IP of class A then use: ping 10.*.*.* Traceroute: Traces the path from your computer to the destination computer.

Cybersecurity

1 min read

Ping, Traceroute, and subnet mask
Ping, Traceroute, and subnet mask
Cybersecurity

1 min read


Published in

System Weakness

·Sep 17, 2022

FTP, HTTP, Telnet,SSH and VLAN

Welcome back, Amazing Hackers in this blog you are going to learn a brief detail about FTP, HTTP, Telnet, and VLAN. File Transfer Protocol(FTP) :

Computer Science

3 min read

FTP, HTTP, Telnet,SSH and VLAN
FTP, HTTP, Telnet,SSH and VLAN
Computer Science

3 min read

Mukilan Baskaran

Mukilan Baskaran

471 Followers

CTF player | Cyber Security Enthusiast

Following
  • Meliha Avdic

    Meliha Avdic

  • Gaurav Sharma

    Gaurav Sharma

  • Mahnoor Writes

    Mahnoor Writes

  • TzeLin Sam

    TzeLin Sam

  • Jocelyn Joy Thomas

    Jocelyn Joy Thomas

See all (814)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams