PinnedKarthikeyan NagarajinSystem WeaknessHow I Found Vulnerabilities in NASA and Got into the Hall of Fame — 4 BugsIn this blog, I share my experience of finding vulnerabilities (bugs) in NASA, the Timeline of Hall of Fame, and Letter of Appreciation |…Aug 222Aug 222
PinnedKarthikeyan NagarajinSystem WeaknessPart 2 — How I Found Vulnerabilities in NASA and Got into the Hall of Fame — 4 Bugs | Karthikeyan…In this blog, I share my experience of finding vulnerabilities (bugs) in NASA, the Timeline of Hall of Fame, and Letter of AppreciationAug 29Aug 29
PinnedKarthikeyan NagarajinSystem WeaknessHow I Discovered an HTTP Request Smuggling Vulnerability in a Major Web ConsoleBug Bounty Essentials by Karthikeyan NagarajSep 5Sep 5
Karthikeyan NagarajWhat is Prototype Pollution?Bug Bounty Essentials by Karthikeyan Nagaraj2h ago12h ago1
Karthikeyan NagarajWhat is an Open Redirect Vulnerability? And How to Find ItBug Hunting Essentials by Karthikeyan Nagaraj1d ago1d ago
Karthikeyan NagarajHow an Open Redirect Vulnerability Got a Bug Bounty of $500Bug Bounty Reports by Karthikeyan Nagaraj2d ago2d ago
Karthikeyan NagarajinSystem WeaknessHow Finding an SQL Injection Vulnerability Earned a $1000 Bug BountyBug Bounty Reports Explained by Karthikeyan Nagaraj3d ago13d ago1
Karthikeyan NagarajHow HTTP Request Smuggling Vulnerability Gets You a $750 Bug BountyBug Bounty Reports Explained by Karthikeyan Nagaraj4d ago4d ago
Karthikeyan NagarajinSystem WeaknessPost-Exploitation Techniques: What Happens After a Hack?Bug Bounty Essentials by Karthikeyan Nagaraj5d ago15d ago1
Karthikeyan NagarajinSystem WeaknesscyberExploring Client-Side Desync: Understanding the Risk and Mitigating the ThreatBug Bounty Essentials by Karthikeyan Nagaraj6d ago6d ago