Open in app

Sign in

Write

Sign in

MRunal
MRunal

956 Followers

Home

Lists

About

Pinned

The Dark Side of Covering Up Data Breaches: Why Transparency is Crucial

In today’s digital age, data breaches are happening more frequently. Cyberattacks that can compromise sensitive data like personal information, financial data, and intellectual property are a threat to businesses of all sizes and sectors. While some businesses decide to acknowledge these security lapses and take responsibility, others would rather keep…

Top Data Breaches

4 min read

The Dark Side of Covering Up Data Breaches: Why Transparency is Crucial
The Dark Side of Covering Up Data Breaches: Why Transparency is Crucial
Top Data Breaches

4 min read


Apr 28, 2022

What to do to protect yourself against fake websites

Now when you are looking for something on the Internet, then most likely several links in the search engine results are fake sites that look like sites of online stores or even banks, but in fact, they only collect your logins and passwords, credit card numbers, etc. money from them…

Cybersecurity

3 min read

What to do to protect yourself against fake websites
What to do to protect yourself against fake websites
Cybersecurity

3 min read


Oct 27, 2020

Let’s talk about Improper Resource Shutdown

The program does not deliver or inaccurately releases a resource before it is made available for re-use. the function fails to release a lock it acquires, which might lead to a deadlock. 1. Android SQLite Database The Android project fails to release the Android database handler in its onPause(), onStop(), or onDestroy() event handlers.An…

Bug Bounty

4 min read

Let’s talk about Improper Resource Shutdown
Let’s talk about Improper Resource Shutdown
Bug Bounty

4 min read


Oct 12, 2020

ARPCON 2020 Forensics and Misc Challenge Write-up

Hello guys I hope you liked the CTF and the virtual hacking conference. I come directly to the point “ सीधी बात नो बकवास ”

Forensics

5 min read

ARPCON 2020 Forensics and Misc Challenge Write-up
ARPCON 2020 Forensics and Misc Challenge Write-up
Forensics

5 min read


Published in

InfoSec Write-ups

·Aug 17, 2020

Let’s talk about buffer overflow

A buffer overflow, or buffer overrun, occurs when more extra data is put into a fixed-length buffer than the buffer can manage. Buffer overflow is possibly the best-known form of software security vulnerability. Most software developers know what a buffer overflow vulnerability is, but buffer overflow attacks corresponding to both…

Buffer Overflow

6 min read

Let’s talk about buffer overflow
Let’s talk about buffer overflow
Buffer Overflow

6 min read


Published in

InfoSec Write-ups

·Jun 1, 2020

Let’s talk about privacy violation issues in android

When security and privacy demand clash, privacy should usually be given a higher priority. To accomplish this and still maintain required security information, cleanse any private information before it exits the program. To enforce good privacy management, develop and strictly adhere to internal privacy guidelines. The guidelines should specifically describe…

Android

5 min read

Let’s talk about privacy violation issues in android
Let’s talk about privacy violation issues in android
Android

5 min read


Jan 16, 2020

Let’s talk about open redirect vulnerability

Explanation Redirects allow web applications to direct users to different pages within the same application or to external sites. Applications utilize redirects to aid in site navigation and, in some cases, to track how users exit the site. …

Infosec

3 min read

Let’s talk about open redirect vulnerability
Let’s talk about open redirect vulnerability
Infosec

3 min read


Published in

InfoSec Write-ups

·Oct 25, 2019

When I found iframe injection and illegal redirect (dom based)

An iFrame injection is a very common cross-site scripting (or XSS) attack. It consists of one or more iFrame tags that have been inserted into a page or post’s content and typically downloads an executable program or conducts other actions that compromise the site visitors’ computers. In the best case…

Bug Bounty

2 min read

When i found iframe injection and illegal redirect (dom based)
When i found iframe injection and illegal redirect (dom based)
Bug Bounty

2 min read


Published in

InfoSec Write-ups

·Oct 12, 2019

When I found error logs through debug information(cgi scripts) and ws-ftp log

During the assessment, I have found the debug URL on xyz.com which is disclosing the error logs.. sorry i can’t disclose website name … lets start… when i start to recon and try to find bugs on this program . i tried many things like xss,idor,nd etc….(nothing spot) when i…

Cybersecurity

5 min read

When i found error logs through debug information(cgi scripts) and ws-ftp log
When i found error logs through debug information(cgi scripts) and ws-ftp log
Cybersecurity

5 min read


Published in

InfoSec Write-ups

·Sep 29, 2019

Let’s see how session cookie or cookie not sent over SSL

Explanation Modern web browsers support a secure flag for each cookie. If the flag is set, the browser will only send the cookie over HTTPS. Sending cookies over an unencrypted channel can expose them to network sniffing attacks, so the secure flag helps keep a cookie's value confidential. …

Ssl

3 min read

Let’s see how session cookie or cookie not sent over SSL
Let’s see how session cookie or cookie not sent over SSL
Ssl

3 min read

MRunal

MRunal

956 Followers

Blogger | Security Researcher | Digital forensic analyst | Twitter — @mrunal110

Following
  • Pratik Dabhi

    Pratik Dabhi

  • Gnana Aravind K

    Gnana Aravind K

  • Aydin Naserifard

    Aydin Naserifard

  • Bharath

    Bharath

  • inc. magazine

    inc. magazine

See all (160)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams