Open in app

Sign In

Write

Sign In

Divyanshu
Divyanshu

953 Followers

Home

About

Mar 22

How Yoga & Ayurveda Helped Me To Handle Burnout

As a member of the infosec community, I have observed that many individuals are experiencing exhaustion and burnout for various reasons. Each person may have unique circumstances leading to these feelings. …

Yoga

2 min read

How Yoga & Ayurveda Helped Me To Handle Burnout
How Yoga & Ayurveda Helped Me To Handle Burnout
Yoga

2 min read


Published in

InfoSec Write-ups

·Mar 17

Alibaba Cloud WAF Command Injection Bypass via Wildcard Payload in All 1,462 Built-in Rule Set

Alibaba WAF version 3.0 was tested and very common payload was found bypassing command injection. While testing the capabilities of the firewall itself it was found that it was possible to bypass the rules. …

Cloud

3 min read

Alibaba Cloud WAF Command Injection Bypass via Wildcard Payload in All 1,462 Built-in Rule Set
Alibaba Cloud WAF Command Injection Bypass via Wildcard Payload in All 1,462 Built-in Rule Set
Cloud

3 min read


Published in

InfoSec Write-ups

·Jun 28, 2022

HTML and Hyperlink Injection via Share Option In Microsoft Onenote Application

Hyperlink Injection it’s when attacker injecting a malicious link when sending an email invitation. HTML injection attack is injecting HTML code through the vulnerable parts of the website. The Malicious user sends HTML code through any vulnerable field with a purpose to change the website’s design or any information, that…

Microsoft

4 min read

HTML and Hyperlink Injection via Share Option In Microsoft Onenote Application
HTML and Hyperlink Injection via Share Option In Microsoft Onenote Application
Microsoft

4 min read


Published in

InfoSec Write-ups

·Jun 1, 2022

Kubernetes 101 | Setting up Kubernetes Cluster Locally

This blog is about setting the local Kubernetes cluster for learning & testing using multiple tools like Kind, Minikube, Kubeadm & K3s. KIND kind is a tool for running local Kubernetes clusters using Docker container “nodes”. …

Kubernetes

6 min read

Kubernetes 101 | Setting up Kubernetes Cluster Locally
Kubernetes 101 | Setting up Kubernetes Cluster Locally
Kubernetes

6 min read


Published in

InfoSec Write-ups

·May 25, 2022

Module-3 | Introduction -Pentesting & Bypassing AWS/Azure/GCP Cloud WAF Fun & Profit

1. Setting up Vulnerable Application For AWS WAF We will be setting custom DVWA for pentesting WAF. 1.1. We need to set up the ec2 instance where we will host DVWA. Let’s start by creating the instance by clicking “Launch Instances”.

Firewall

11 min read

Module-3 | Introduction -Pentesting & Bypassing AWS/Azure/GCP Cloud WAF Fun & Profit
Module-3 | Introduction -Pentesting & Bypassing AWS/Azure/GCP Cloud WAF Fun & Profit
Firewall

11 min read


Published in

InfoSec Write-ups

·May 25, 2022

Module-2 | Introduction -Pentesting & Bypassing AWS/Azure/GCP Cloud WAF Fun & Profit

Q. What is Core Rule Set & why it is utilized by all the cloud WAFs? A. …

AWS

7 min read

Module-2 | Introduction -Pentesting & Bypassing AWS/Azure/GCP Cloud WAF Fun & Profit
Module-2 | Introduction -Pentesting & Bypassing AWS/Azure/GCP Cloud WAF Fun & Profit
AWS

7 min read


Published in

InfoSec Write-ups

·May 25, 2022

Secure Code Review -1 | Cheat sheet For Security Vulnerability In Python — Injection Flaws

Based on OWASP Top-10 Vulnerabilities. This time we are looking for secure coding bugs related to Injection Flaws 1) Path Traversal Attack Vulnerable Code Block def get_video(self, path=None): self.check_user_auth() data = None if not path: path = self.get_video_path() path = path[0] if path else None if…

Coding

4 min read

Coding

4 min read


Published in

InfoSec Write-ups

·May 16, 2022

Module-1 | Introduction -Pentesting & Bypassing AWS/Azure/GCP Cloud WAF Fun & Profit

Why you should not trust the cloud WAF? Introduction & Objective A web application firewall (WAF) or WAF appliance provides security by operating through an application or service thus blocking malicious calls, inputs, and outputs that do not meet the policy of a firewall. …

Waf

4 min read

Module-1 | Introduction -Pentesting & Bypassing AWS/Azure/GCP Cloud WAF Fun & Profit
Module-1 | Introduction -Pentesting & Bypassing AWS/Azure/GCP Cloud WAF Fun & Profit
Waf

4 min read


Published in

InfoSec Write-ups

·Apr 11, 2022

Hands on Tutorial of Amazon Simple Notification Service (SNS)

Amazon Simple Notification Service (Amazon SNS) is a fully managed messaging service for both application-to-application (A2A) and application-to-person (A2P) communication. How does Amazon SNS work? It is very easy to get started with Amazon SNS. Developers must first create a “topic” which is an “access point” — identifying a specific…

AWS

6 min read

Hands on Tutorial of Amazon Simple Notification Service (SNS)
Hands on Tutorial of Amazon Simple Notification Service (SNS)
AWS

6 min read


Published in

InfoSec Write-ups

·Sep 26, 2021

Quick Guide For Running Clair Scanner via Katacoda

This guide talks about setting up the Clair scanner and performs scans on vulnerable DVWA container. Also now it is possible to perform a hands-on demo on katacoda. You can run the demo on Katacoda. For running the demo visit https://www.katacoda.com/justmorpheus Setting up Clair server or using locally. CoreOs Clair https://github.com/coreos/clair Clair-scanner https://github.com/arminc/clair-scanner

Katacoda

3 min read

Quick Guide For Running Clair Scanner via Katacoda
Quick Guide For Running Clair Scanner via Katacoda
Katacoda

3 min read

Divyanshu

Divyanshu

953 Followers

Meh

Following
  • Netflix Technology Blog

    Netflix Technology Blog

  • Anangsha Alammyan

    Anangsha Alammyan

  • David Gilbertson

    David Gilbertson

  • Gupta Bless

    Gupta Bless

  • Vickie Li

    Vickie Li

See all (187)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams