Penetrating Networks

0 %
Navid Fazle Rabbi
Sr. Security Researcher
Offensive Security Research
bKash Ltd.
Research Interest
  • 🔒 Web & Mobile AppSec
  • 💥 Side-Channel Analysis
  • 🤖 AI Attacks & AI Security
  • 🔗 Blockchain & Web3 Security
  • 🌐 Browser Security
  • 💻 Source Code Analysis
  • 🔐 Real-world Cryptograpy
  • 💣 Exploit Development
  • 🔄 Reverse Engineering
  • 🌐 IoT Security

CTF

TryHackMe | Corridor
TryHackMe | Corridor

In this blog, I will try to show and explain the TryHackMe room Corridor. This room explores potential IDOR vulnerabilities…

TryHackMe | Reversing ELF
TryHackMe | Reversing ELF

In this blog, I will try to show and explain the TryHackMe room Reversing Elf. This room features eight increasingly…

TryHackMe | Weaponization
September 17, 2022 / CTF, Red Team
TryHackMe | Weaponization

In this blog, I will try to show and explain the TryHackMe room Weaponization in a short way. Weaponization is…

TryHackMe | Reverse Engineering | 0x41haz
TryHackMe | Reverse Engineering | 0x41haz

In approach to solving the TryHackMe challenge – There is a binary that needs to be reversed and understood, including…

Find Me if You Can
Find Me if You Can

I had the chance to learn a new way to solve a steganographic challenge when I tried to solve a…

HackTheBox | Crypto | BabyEncryption Walkthrough
HackTheBox | Crypto | BabyEncryption Walkthrough

My approach to solving a basic Hack The Box encryption challenge. For me, the most significant aspect of this challenge…