Khurshid HassanXXE Injection Vulnerability - A Detailed Analysis and Exploitation — Part 1Following the thought appeared in my mind I came up with ad idea let’s do it but with a different way.Aug 2, 2021Aug 2, 2021
Khurshid HassanObfuscating internet traffic through SSH and VPN tunnelsWhen VPN connection is very slow or ISP throttles the VPN down then traffic can be tunneled out of the region and connect to VPN from…Dec 15, 2020Dec 15, 2020
Khurshid HassanFile transfer from compromised machine to attacking machine with SMB service when attacking…Motive of demonstration:Oct 9, 2020Oct 9, 2020
Khurshid HassanBackDooring a PE Binary: Part-1No ASLR and DEP enabled in software — Second part will bring Binary Backdooring in DEP and ASLR enabled software.Feb 2, 2020Feb 2, 2020