Open in app
Home
Notifications
Lists
Stories

Write
Mukilan Baskaran
Mukilan Baskaran

Home

About

Published in InfoSec Write-ups

·Pinned

How I found Clickjacking bug

Bug Bounty Writeup — Welcome back amazing another important topic on how I found out clickjacking bug. Initially after doing the recon phase did some SQL injection, XSS, XXE, and SSRF but I couldn’t find anything interesting. After I looked for any headers missed or not and I came to know X-Frame-Options missed out. …

Bug Bounty

1 min read

How I found Clickjacking bug
How I found Clickjacking bug

Published in InfoSec Write-ups

·Pinned

Bolt — TryHackMe

Writeup — Welcome back amazing hackers, in this blog, I am going to show you an interesting walkthrough writeup that might be useful in bug bounty findings. let's get into the writeup, firstly deploy the machine after that making some Nmap scan to find the useful information. From the Nmap result, I…

Bug Bounty

3 min read

Bolt — TryHackMe
Bolt — TryHackMe

Pinned

Walking an Application -TryHackme

Welcome back amazing fellow hackers in this blog you are gonna see how to walk through websites manually for security issues in websites by inbuilt tools in the browser. We are gonna see a list of inbuilt tools that we are gonna walk through on browsers which are : View…

Walking An Application

2 min read


Published in InfoSec Write-ups

·Pinned

SQL Injection JR. Pentester -TryHackMe

Hi, amazing hackers in this story you are gonna how to what is SQL injections and how to find them in different types. SQL injection is also defined as SQLi, an attack scenario on an application web server database by executing malicious queries in the database which results in stealing…

Tryhackme

4 min read

SQL Injection JR. Pentester -TryHackMe
SQL Injection JR. Pentester -TryHackMe

Pinned

TryHackme Learn and win prizes #2

TryHackme provides amazing cybersecurity contents day by day you can learn and practice more to enrich the skills. It gives anyone who is interested to enter cybersecurity it is a right platform and you can more updates and success stories of those who succeed in this field. …

Pentester

1 min read


Aug 8

Mindset Of BugBounty

In this blog, I'm going to discuss the proper mindset for learning new technologies and approaching new bug bounty testing. Firstly train your mind to learn or explore new things that strengthen your positive mindset. Acceptance will take you away from ego clash and negative mindset and make focus on…

Books

3 min read

Mindset Of BugBounty
Mindset Of BugBounty

Published in InfoSec Write-ups

·Aug 1

Intro to Digital Forensics

Learn about digital forensics and related processes, then practice with a real-world example. Forensics is the use of science to investigate crimes and determine facts. With the use and spread of digital systems, such as computers and smartphones, a new branch of forensics, computer forensics, was born to investigate related…

Tryhackme

5 min read

Intro to Digital Forensics
Intro to Digital Forensics

Published in InfoSec Write-ups

·Apr 28

PicoCTF 2022 Web Exploitation

Includes, Insp3ct0r, where are the robots, Power Cookie — Welcome back amazing hackers, after a long time I am boosted again by posting a blog on another interesting jeopardy CTF challenge PicoCTF 2022. In this write-up, we are going to see some of the web exploitation challenges. First Challenge Insp3ct0r

Picoctf

3 min read

PicoCTF 2022 Web Exploitation
PicoCTF 2022 Web Exploitation

Mar 23

Information Disclosure Bug

Web security — What is an Information disclosure Bug? Information disclosure vulnerability is the leakage of sensitive information to its users. If this bug is present in any of the web applications it may leak sensitive data to an untrusted user. Data such as username or financial information leaked to untrusted users.Then …

Infosec

1 min read

Information Disclosure Bug
Information Disclosure Bug

Published in InfoSec Write-ups

·Mar 15

Bounty Hacker Tryhackme

CTF Writeup — Welcome Back, Amazing Hackers I came up with another CTF writeup on TryHackme writeup. First I started scanning the target whether any interesting services and ports were exposed to gain into the system. I found three ports opened.

Tryhackme

2 min read

Bounty Hacker Tryhackme
Bounty Hacker Tryhackme
Mukilan Baskaran

Mukilan Baskaran

CTF player | Cyber Security Enthusiast

Following
  • Vritant Kumar

    Vritant Kumar

  • Jameson Steward

    Jameson Steward

  • Mickey Mellen

    Mickey Mellen

  • Ash Moran

    Ash Moran

  • EP McKnight, MEd

    EP McKnight, MEd

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable