PinnedKarthikeyan NagarajinSystem WeaknessHow I Found Vulnerabilities in NASA and Got into the Hall of Fame — 4 BugsIn this blog, I share my experience of finding vulnerabilities (bugs) in NASA, the Timeline of Hall of Fame, and Letter of Appreciation |…Aug 222Aug 222
PinnedKarthikeyan NagarajinSystem WeaknessPart 2 — How I Found Vulnerabilities in NASA and Got into the Hall of Fame — 4 Bugs | Karthikeyan…In this blog, I share my experience of finding vulnerabilities (bugs) in NASA, the Timeline of Hall of Fame, and Letter of AppreciationAug 29Aug 29
PinnedKarthikeyan NagarajHow I Discovered an HTTP Request Smuggling Vulnerability in a Major Web ConsoleBug Bounty Essentials by Karthikeyan Nagaraj2d ago2d ago
Karthikeyan NagarajcyberExploring Client-Side Desync: Understanding the Risk and Mitigating the ThreatBug Bounty Essentials by Karthikeyan Nagaraj4h ago4h ago
Karthikeyan NagarajHow I Explored Further and Chained HTTP Request Smuggling with Other VulnerabilitiesBug Bounty Essentials by Karthikeyan Nagaraj1d ago1d ago
Karthikeyan NagarajAdvanced Strategies to Defend Against HTTP Request Smuggling: A Deep DiveBug Bounty Essentials by Karthikeyan Nagaraj3d ago3d ago
Karthikeyan NagarajHTTP Request Smuggling: The Hidden Web Threat You Need to Know AboutBug Bounty Essentials by Karthikeyan Nagaraj | Portswigger4d ago4d ago
Karthikeyan Nagaraj26.18 Lab: Web cache poisoning via HTTP/2 request tunnellingThis lab is vulnerable to request smuggling because the front-end server downgrades HTTP/2 requests and doesn’t consistently sanitize…5d ago5d ago
Karthikeyan Nagaraj26.18 Lab: Bypassing access controls via HTTP/2 request tunnelingThis lab is vulnerable to request smuggling because the front-end server downgrades HTTP/2 requests and fails to adequately sanitize…6d ago6d ago
Karthikeyan NagarajHow Attackers Sneak in Hidden Requests and What You Can Do About ItUnderstanding HTTP Request Smuggling: A Beginner to Intermediate Guide | Karthikeyan NagarajAug 31Aug 31