Feb 2A misconfigured Apache Airflow to AWS Account CompromiseIt’s been a long time since I have penned down my findings with the security community and I think this write-up was worth sharing. In summary, this is about how I was able to exploit a security misconfiguration present in the older version of Apache Airflow for authentication bypass which…Security5 min read
May 18, 2021Shift Left with AWS Codepipleine — Scanning every single code changeIN the agile world, where continuous iteration of development and testing happens throughout the SDLC (software development lifecycle), where there is a constant collaboration with stakeholders and continuous improvement and iteration happening at every stage, and also where development of features takes place at the rapid pace. …AWS7 min read
Jan 27, 2021OTP Bypass Account Takeover to Admin Panel — Ft. Header InjectionIt looks like this year has great promises at least the starting is good. Already 3 bug bounty in the pipeline(just showing off:P) and learned a nice methodology which laid down the opportunity for me to write and share this writeup with everyone. …Hacking4 min read
Nov 17, 2020Tale of 3 vulnerabilities to account takeover!Hi Guys, So, after a gap of around 8 months, I recently did some bug hunting with the hope that I could learn something, and eventually, it also fetches me a decent reward. This blog will be around not only what vulnerabilities I was able to find but I would…Bug Bounty5 min read
Oct 7, 2020Securing Container using Threat Modelling— STRIDEThe increased adoption of containers has given rise to a wide range of potential threats to microservices apps that run in containers. If you are working in an organization and your workload is over containers then this blog is more targeted for you. …Containers5 min read
Published in Lambda by Blinkit·Jul 29, 2020How Continuous Github Code Hacking Keeps Grofers SecureSecurity shouldn’t be treated as an after-thought — When it comes to security, we always take it as the utmost priority. We strongly believe that “Security shouldn’t be treated as an after-thought”, it should be brought as close to engineers and as early in SDLC. Aside from the general guidelines put forth in the CIS benchmark for all…Devsecops5 min read
May 28, 2020Phone Number Privacy? We don’t do that here: Google Hangout Call!Work-from-home culture slowly becoming a norm With work-from-home culture slowly becoming a norm, IT companies around the globe are bringing in various new developments in its team engagement tools to cater to such needs and also to compete with every increasing popularity of Zoom. Zoom which has recently come under the radar with hackers exploiting various…Google4 min read
Apr 9, 2020Docker Registries and their secretsNever leave your docker registry publicly exposed! Recently, I have been exploring dockers a lot in search of misconfigurations that organizations inadvertently make and end up exposing critical services to the internet. …Docker4 min read
Jan 10, 2020Hacking ‘Docker’, the Shodan way!Never leave your docker host publicly exposed! For the last couple of months, I have been exploring various concepts of container security both from the perspective of attacking a container and defending the same. Containers have already taken a big space in the market. According to Docker, over 3.5 million applications have been placed in containers using…Docker4 min read
Dec 5, 2019ORS Patient Portal —Digital India initiative put at risk the leakage of millions of patients’ health informationThis blog is posted with the intention of a wake up call for the government to improve and strengthen its commitment towards responsible data practices and helps to highlight the below par security standards in the IT industry and bring to the attention, the importance of security and spread awareness…Ethical Hacking6 min read