Open in app
Home
Notifications
Lists
Stories

Write
Yuvraj Singh (TheDarkLord)
Yuvraj Singh (TheDarkLord)

Home
About

2 hours ago

Nebula (6–10) — Exploit Education

Overview Nebula is a set of exploitation challenges centered around the concept of privilege escalation in Linux. There are set of 19 challenges covering the different aspects, techniques and approaches to privilege escalation abuse in Linux. Here I will cover challenges 6–10. I have covered the other challenges of the series…

Ctf

7 min read

Nebula (6–10) — Exploit Education
Nebula (6–10) — Exploit Education

2 days ago

Nebula (0–5) — Exploit Education

Overview Nebula is a set of exploitation challenges centered around the concept of privilege escalation in Linux. There are set of 19 challenges covering the different aspects, techniques and approaches to privilege escalation abuse in Linux. Here I will cover challenges 0–5 To understand the different approaches and techniques used in…

Ctf

5 min read

Nebula (0–5) —   Exploit Education
Nebula (0–5) —   Exploit Education

4 days ago

Natas Wargames writeup(16–30)

Overview These set of challenges on the Wargames are focussed on Web Application Security Testing and Scanning. Each machine stores the credentials for the next machine. All passwords are also stored in /etc/natas_webpass/. In this article, I cover the solutions from 16–30. The next 4 challenges would be posted shortly (31–34)…

Ctf

19 min read

Natas Wargames writeup(16–30)
Natas Wargames writeup(16–30)

Jun 26

Natas WargamesWriteup (0–15)

Overview These set of challenges on the Wargames are focussed on Web Application Security Testing and Scanning. Each machine stores the credentials for the next machine. All passwords are also stored in /etc/natas_webpass/. In this article, I cover the solutions from 0–15. These challenges start out easy, but some of these…

Ctf Writeup

6 min read


Jun 26

Bandit Write-up: Exploit Education

Overview These are the easiest problems of the wargame prepping us for the reverse engineering and tougher challenges that lie ahead. We have a series of 34 machines to ssh into, and each machine holds the password to the next machine. It is highly recommended to solve the challenges on your…

Ctf Writeup

9 min read


Dec 19, 2021

Vulnhub writeup: Mr Robot

Basic Description The basic description of the machine can be found at Vulnhub website. It is hinted there that the machine does not involve any reverse engineering and advance exploitation techiniques. This is nice because I am a newbie to reverse engineering, kernel exploitation, exploiting race conditions etc etc. The machine and…

Vulnhub

7 min read

Vulnhub writeup: Mr Robot
Vulnhub writeup: Mr Robot

Dec 19, 2021

Privacy by design — An introduction

Introduction and History: Privacy Before going into the depth of privacy by design, we must understand What is privacy? Do we need privacy? And if yes, how do we define the degree of privacy or if there is something called absolute privacy. There have been 2 opposing sides when it comes to privacy as…

Privacy By Design

10 min read

Privacy by design — An introduction
Privacy by design — An introduction

Dec 18, 2021

What is Differential Privacy?

Overview The lines between our identities and digital personas are blurring. We use more digital services than ever before, and like the unfiltered exhaust pipes of vehicles, belch out a noticeable trail which follows us. The digital services we use are extensively data driven. As the digital age advances, our reliance…

Privacy

8 min read

What is Differential Privacy?
What is Differential Privacy?

Jul 7, 2020

Pfsense Firewall explained — Part-2

Overview In my last blog on pfSense, I covered how to try out some of the basic firewall functionality of the FreeBSD-based firewall. However pfSense is more than just a firewall, it can act as a router and support functionalities such as those of a loadbalancer and a failover. It even…

Pfsense

11 min read

Exploring Pf-sense Firewall, Part-2
Exploring Pf-sense Firewall, Part-2

Jul 6, 2020

My first bug bounty and vulnerability disclosure

Overview On a sunday morning, I discovered that I had slept on my spectacles and broken them. In India , I always buy my spectacles from this popular eyeglass retailer, and was quite happy to discover that they deliver here in the US as well. While on the process of purchasing…

Bug Bounty

4 min read

My first Bug bounty
My first Bug bounty
Yuvraj Singh (TheDarkLord)

Yuvraj Singh (TheDarkLord)

Computer & N/w security enthusiast, crypto fanatic. Exploiting things in a dimly lit room. https://github.com/reg1reg1 https://reg1reg1.github.io.

Following
  • Chad Warner

    Chad Warner

  • Barack Obama

    Barack Obama

  • Anand Prakash - PingSafe

    Anand Prakash - PingSafe

  • Shambhavi

    Shambhavi

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable