Open in app

Sign In

Write

Sign In

7h3h4ckv157
7h3h4ckv157

547 Followers

Home

About

Published in InfoSec Write-ups

·Pinned

About the discovery of another security vulnerability in NASA

- 7h3h4ckv157 This write-up is approximately my “nth disclosure” in NASA. If any of you doesn't know about NASA, I'll explain ⬇ The National Aeronautics and Space Administration (NASA) is an independent agency of the US federal government responsible for the civil space program, aeronautics research, and space research. NASA's…

NASA

5 min read

About the discovery of another security vulnerability in NASA
About the discovery of another security vulnerability in NASA
NASA

5 min read


Published in InfoSec Write-ups

·Oct 22, 2022

Hacked Tathva ’22 Biggest Techno-Management Fest in South India

- 7h3h4ckv157 Hello, Infosec mates ッ✋✋, In this write-up, I’m sharing a short story about how I hacked Tathva → the biggest Techno-Management Fest in South India. (Techno-management fest of NIT Calicut) It has found itself a place in every engineering student’s calendar. …

Infosec

3 min read

Hacked Tathva ’22 Biggest Techno-Management Fest in South India
Hacked Tathva ’22 Biggest Techno-Management Fest in South India
Infosec

3 min read


Published in InfoSec Write-ups

·May 10, 2022

PWN101 Walkthrough | TryHackMe

Hello, infosec 👋 I’m back with another one after a short-term break. I’m exterior the box to make new connections, Social relationships and take care of my mental health. …

Reverse Engineering

6 min read

PWN101 Walkthrough | TryHackMe
PWN101 Walkthrough | TryHackMe
Reverse Engineering

6 min read


Published in InfoSec Write-ups

·Jan 24, 2022

Hack into Skynet — Real World CTF (2022) walkthrough

Hello hackers ッ✋✋, In this writeup, I’m sharing one of the potential methods to pwn a web challenge on Real world CTF 2022. All challenges built on top of real-world applications & due to the impact of COVID-19, The 4th Real World CTF was online mode. From the challenge definition…

Ctf

6 min read

Hack into Skynet —  Real World CTF (2022) walkthrough
Hack into Skynet —  Real World CTF (2022) walkthrough
Ctf

6 min read


Published in InfoSec Write-ups

·Jan 6, 2022

Authorization bypass — Gmail

About the vulnerability The most uncomplicated but trickiest case on Gmail that allows the attackers to send emails impersonating known brands and individuals to deceive targets. Without more outlying back-and-forths, let’s plunge into the topic. Gmail Authorization Gmail is never asking you to prove your identity when creating a Google account. All…

Google

4 min read

Authorization bypass — Gmail
Authorization bypass — Gmail
Google

4 min read


Published in InfoSec Write-ups

·Dec 18, 2021

Hacked Google-Meet…??!

15th June 2021 Hello, infosec community ✋ Today I’m here to reveal an occurrence in my life which happened in June 2021. If you’re a complete beginner, leet, or off folk in infosec, whatever, it doesn’t matter. This write-up is for every individual who has a vigorous appetite for reading. I…

Bug Bounty

7 min read

Hacked Google-Meet…??!
Hacked Google-Meet…??!
Bug Bounty

7 min read


Published in InfoSec Write-ups

·Dec 3, 2021

Into the art of Binary Exploitation 0x000004[Reviving of Satanic-ROP]

Continuation of sorcery…!! Hey enthusiasts ✋✋, I’m back again with my 4th part of the adventure Binary-Exploitation series. First of all, I wanna apologize for the crevices. The work was boisterous, & a few health issues were there. Presently, I’m fine after the surgery. …

Reverse Engineering

11 min read

Into the art of Binary Exploitation 0x000004[Reviving of Satanic-ROP]
Into the art of Binary Exploitation 0x000004[Reviving of Satanic-ROP]
Reverse Engineering

11 min read


Published in InfoSec Write-ups

·Oct 14, 2021

Into the art of Binary Exploitation 0x000003 [Prominence of Integer-Overflow]

Hey hackers ✋✋, I’m back again with another portion of our enterprise, the binary exploitation series. In case you’re perusing my article 1st time ?? I unassumingly request you to spend a little time on my previous parts of the series before proceeding. …

Reverse Engineering

7 min read

Into the art of Binary Exploitation 0x000003 [Prominence of Integer-Overflow]
Into the art of Binary Exploitation 0x000003 [Prominence of Integer-Overflow]
Reverse Engineering

7 min read


Published in InfoSec Write-ups

·Oct 2, 2021

Into the art of Binary Exploitation 0x000002 [Sorcery of ROP]

Hey Hackers, ✋✋ I’m back again with the following piece from the “Binary Exploitation” series. I had open the entryway for unused comers into this craftsmanship of exploitation. So I decently secured straightforward steps within the past write-up to make commonplace with the subject & this will be the continuation…

Reverse Engineering

10 min read

Into the art of Binary Exploitation 0x000002 [Sorcery of ROP]
Into the art of Binary Exploitation 0x000002 [Sorcery of ROP]
Reverse Engineering

10 min read


Published in InfoSec Write-ups

·Aug 23, 2021

Into the art of Binary Exploitation 0x000001 [Stack-Based Overflow]

Dear Fellow hackers & info-sec hobbyists ✋🏻 Here I’m gonna plan to release a series of writes about “Binary Exploitation”. As you know it’s a vast & core area of hacking space. Before I start, to be frank, for people who don’t have a computer science background this may not…

Binary Exploitation

11 min read

Into the art of Binary Exploitation 0x000001 [Stack-Based Overflow]
Into the art of Binary Exploitation 0x000001 [Stack-Based Overflow]
Binary Exploitation

11 min read

7h3h4ckv157

7h3h4ckv157

547 Followers

Offensive Security Researcher

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech