PinnedKarthikeyan NagarajinSystem WeaknessHow I Found Vulnerabilities in NASA and Got into the Hall of Fame — 4 BugsIn this blog, I share my experience of finding vulnerabilities (bugs) in NASA, the Timeline of Hall of Fame, and Letter of Appreciation |…Aug 226Aug 226
PinnedKarthikeyan NagarajinSystem WeaknessHow I Discovered an HTTP Request Smuggling Vulnerability in a Major Web ConsoleBug Bounty Essentials by Karthikeyan NagarajSep 5Sep 5
Karthikeyan NagarajUnderstanding File Permissions and OwnershipLinux Essentials by Karthikeyan Nagaraj4h ago4h ago
Karthikeyan NagarajinSystem WeaknessUnderstanding the Linux File System StructureLinux Essentials by Karthikeyan Nagaraj1d ago1d ago
Karthikeyan NagarajinSystem WeaknessBasic Linux Refreshers: Part 1 — Introduction to Linux and Why It MattersLinux Essentials by Karthikeyan Nagaraj2d ago2d ago
Karthikeyan NagarajinSystem WeaknessGuide to Finding and Exploiting Web Cache PoisoningWhy you should learn Web Cache Poisoning? | Bug Bounty Essentials by Karthikeyan Nagaraj3d ago3d ago
Karthikeyan NagarajinSystem WeaknessHow to Find IDOR Vulnerabilities: A Guide for Bug Bounty Hunters and DevelopersBug Bounty Essentials by Karthikeyan Nagaraj4d ago34d ago3
Karthikeyan NagarajinSystem WeaknessWhat is Prototype Pollution?Bug Bounty Essentials by Karthikeyan Nagaraj5d ago15d ago1
Karthikeyan NagarajinSystem WeaknessWhat is an Open Redirect Vulnerability? And How to Find ItBug Hunting Essentials by Karthikeyan Nagaraj6d ago6d ago
Karthikeyan NagarajinSystem WeaknessHow an Open Redirect Vulnerability Got a Bug Bounty of $500Bug Bounty Reports by Karthikeyan NagarajSep 121Sep 121