Published inInfoSec Write-upsEpic Bug Hunting Failures-2Hey! This is my second part of Epic Bug Hunting Failures. Part two of our is locked and loaded here. If you missed the first act, catch up…Nov 21, 202388Nov 21, 202388
Are Your APIs Robust Enough? Testing Rate limits with k6 Spike Tests.Hi everybody, Varshini Ramesh here. Why did I chose this topic is because, One crucial aspect of API performance is rate limiting → the…Oct 14, 2023Oct 14, 2023
Published inInfoSec Write-upsFindings in Swiggy’s Codebase: Memory Leak and Google Maps API Key Exposure.Greetings, Infosec aficionados! Today, we’re diving into the Swiggy’s tech oopsies, featuring not one but two delightful vulnerabilities.Aug 8, 20231Aug 8, 20231
Bug Bounty Hunting- Unleashing Your Inner Swag HunterI’m Varshini Ramesh, here’s another blog on finding bugs and getting rewarded. Here we go…Jul 5, 20231Jul 5, 20231
Subdomain Takeover at Khan academyHey there, fellow earthlings! Brace yourselves for the grand entrance of Varshini…May 28, 2023May 28, 2023
Published inInfoSec Write-upsEpic Bug Hunting FailuresHey People, I am Varshini Ramesh trying to be a Security analyst from years!). So When I started bug hunting it was so funny I made…May 23, 20231May 23, 20231
Downplaying CybersecurityHey there, fellow tech enthusiasts and cyber-doubters! It’s time to have a little chat about something we’ve been taking a bit too lightly…May 17, 2023May 17, 2023
Broken Link Hijacking In FreshworksHello! I hope everyone is doing splendidly, Hey there! I know lots of people are already familiar with how to hunt this vulnerability, but…May 11, 20231May 11, 20231
Exposure of Grafana and Prometheus metrics (/debug/pprof)I always have had an interest in recon. Recon is the primary and essential step in pen testing. So please do give more importance to…Feb 22, 2023Feb 22, 2023