HTB Cap Walkthrough

HTB Cap Walkthrough

Explore an in-depth walkthrough of the HTB Cap machine, focusing on network packet analysis and leveraging captured data for exploitation. Follow each step from initial reconnaissance to achieving root access, emphasizing practical network security techniques

November 5, 2024 · 7 min · Bhavik Kanejiya
HTB TwoMillion Walkthrough

HTB TwoMillion Walkthrough

Explore an in-depth walkthrough of the HTB Cap machine, focusing on network packet analysis and leveraging captured data for exploitation. Follow each step from initial reconnaissance to achieving root access, emphasizing practical network security techniques

November 5, 2024 · 12 min · Bhavik Kanejiya
Kubernetes Security Basics: From a Pentester’s Point of View

Let’s do a peek inside the admin dashboard - Abuse API endpoint

Discover a broken access control vulnerability in a popular productivity app with over 2 million users. This post details how an employee gained limited admin privileges by manipulating the API’s workspace ID, including steps to reproduce the exploit.

January 1, 2022 · 2 min · Bhavik Kanejiya