Blog - Choudhary Muhammad Osama
  • Home
  • Blog

Choudhary Muhammad Osama

This is Choudhary Muhammad Osama, a highly accomplished Penetration Tester, Security Analyst and Linux Administration enthusiast, with extensive experience in implementing, maintaining, securing and pentesting web applications and networks.
devops
Article

Best Practices in Securing DevOps

The growing demand for faster software delivery, using public cloud environments, microservices, and containers, has triggered a discussion on the role of security in the world of DevOps. At this year’s DevOps Connect at RSA Conference 2018, nearly 1,200 security professionals gathered to explore ways of embedding security into the Read more…

By Choudhary Muhammad Osama, 7 years ago
Article

Broken AWS Storage Spills Military Secrets Again

Broken AWS Storage Spills Military Secrets Again For the second time in ten days, researchers at UpGuard released sensitive data belonging to the United States Defense Department that was stored insecurely online. This time it was nearly 100 GB of critical data belonging to the United States Army Intelligence and Read more…

By Choudhary Muhammad Osama, 7 yearsDecember 24, 2017 ago
790760028
Article

Analyst Builds WMI-Based Hacking Tool in PowerShell

Security researcher Christopher Truncer discharged a WMI-based agentless post-abuse RAT that he created in PowerShell. A year ago, Truncer discharged a PowerShell script fit for completing distinctive activities by means of Windows Management Instrumentation (WMI), both on the neighborhood and on remote machines. Named WMImplant, the recently discharged Remote Access Read more…

By Choudhary Muhammad Osama, 8 yearsMarch 25, 2017 ago
tor-p
Article

Hazards of TOR Entrance Guards

In recent time, Tor has made the decision to use semi-persistent entry nodes which they call this feature “Entry Guards.” “Entry Nodes” are simply the first node you connect with to join the Tor Network, but an Entry Guard refers to the feature of pinning the entry nodes across sessions. Read more…

By Choudhary Muhammad Osama, 9 yearsAugust 21, 2016 ago
OverTheWire-Wargame-Bandit
Tutorial

OverTheWire Wargame Bandit Walkthrough

Description :- The Bandit wargame is aimed at absolute beginners. It will teach the basics needed to be able to play other wargames. Level 0 :- The goal of this level is to log into the game using SSH. The host to which you need to connect is bandit.labs.overthewire.org. The Read more…

By Choudhary Muhammad Osama, 9 yearsAugust 19, 2016 ago
fingerprint
Article

Fingerprinting Attacks on Screen Resolution

Fingerprinting assaults are methods for recognizing people by some sort of characteristic of their online movement. In a few ways, fingerprinting assaults are the most hazardous and troublesome sort of de-anonymizing dangers to safeguard against. I need to highlight one feature of fingerprinting that is utilized by numerous web administrations Read more…

By Choudhary Muhammad Osama, 9 yearsFebruary 3, 2016 ago
tor
Article

Tor Is Trying to Make Dark Web Sites More Secure

Tor clients were helped about the significance to remember dull web security as of late with news that a college had unmasked both the servers and clients of some shrouded administrations—locales that conceal their area utilizing the Tor arrange—and gave that data to the FBI. Tor has subsequent to fixed Read more…

By Choudhary Muhammad Osama, 9 yearsJanuary 10, 2016 ago
dropcam
POC

HTTP Response Smuggling in Dropcam

Ch. Muhammad Osama, an independent vulnerability researcher has discovered a HTTP Response Smuggling vulnerability in Dropcam website www.dropcam.com. HTTP Response Smuggling :- Data enters a web application through an untrusted source, most frequently an HTTP request. The data is included in an HTTP response header sent to a web user without being validated Read more…

By Choudhary Muhammad Osama, 10 yearsMarch 30, 2015 ago
Xbox
POC

Content Spoofing Found in Xbox Blog

Ch. Muhammad Osama, an independent vulnerability researcher has discovered a Content Spoofing vulnerability in XBOX Blog news.xbox.com, which can be exploited by an attacker to conduct XSS attacks. Content Spoofing :- Content spoofing, also referred to as content injection or virtual defacement, is an attack targeting a user made possible by an Read more…

By Choudhary Muhammad Osama, 10 yearsMarch 15, 2015 ago
step1
Tutorial

How to Edit MS Word Text with C# Console Application

Hello Everyone, Today i am going to show you how to edit Microsoft Word File using C# Step by Step. So Lets Start ! First Step :- Create New Console Application Project and name it what ever you want. Second Step :- Now add Microsoft.Office.Interop.Word Reference. Third Step :- Now Read more…

By Choudhary Muhammad Osama, 10 yearsNovember 24, 2014 ago

Posts pagination

1 2 Next
Search
Recent Posts
  • Best Practices in Securing DevOps
  • Broken AWS Storage Spills Military Secrets Again
  • Analyst Builds WMI-Based Hacking Tool in PowerShell
  • Hazards of TOR Entrance Guards
  • OverTheWire Wargame Bandit Walkthrough
Categories
  • Article
  • POC
  • Tutorial
Recent Comments
  • Artem on How to Edit MS Word Text with C# Console Application
Archives
  • September 2018
  • December 2017
  • March 2017
  • August 2016
  • February 2016
  • January 2016
  • March 2015
  • November 2014
  • September 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • Facebook
  • Twitter
  • Google Plus
  • LinkedIn
  • Github
Hestia | Developed by ThemeIsle