PinnedSachin VerlekarLog4J Vulnerability — Attack & Defense Strategy for Cyber-Security AnalystsOVERVIEW10 min read·Dec 24, 2021----
Sachin VerlekarIs Your Information for Sale on the Dark Web? Check Now with AmIBreachedHave you ever worried about your personal information being exposed in a data breach? Unfortunately, data breaches are a common occurrence…3 min read·Apr 24, 2024----
Sachin VerlekarBypassing Gmail’s Attachment FileRestrictions with HTML SmugglingIn today’s digital era, where cybersecurity threats loom at every corner, it’s crucial for professionals and individuals alike to stay…4 min read·Apr 10, 2024----
Sachin VerlekarDIRTY COW: Vulnerability that Shook the IT World (Case Study)The year was 2016, and a seemingly insignificant vulnerability named Dirty Cow (CVE-2016–5195) lurked within the Linux kernel, waiting to…4 min read·Feb 18, 2024----
Sachin VerlekarAutomate Your CIS Server Hardening Baseline Documentation using PythonAs security professionals, we know the importance of server hardening and following industry best practices like CIS benchmarks. But let’s…3 min read·Jan 7, 2024----
Sachin VerlekarHow to hide your personal spaces from Google Maps Street View?NOTE: The example used below is only for the demonstration purposes. Use this privacy option only for your personal locations.3 min read·Oct 4, 2023----
Sachin VerlekarCurtailing Privacy: The Intrusion, Government Surveillance and Hidden Secrets of IntelligenceDepending upon your circumstances, your government, law enforcement agencies, military or other organizations may be an active threat to…7 min read·Sep 17, 2023----
Sachin VerlekarAdversarial Artificial Intelligence: Bypassing ChatGPT content restrictions using AI PoisoningNOTE: THE CONTENT PROVIDED BELOW IS ONLY FOR THE EDUCATIONAL PURPOSE. I TAKE NO RESPONSIBILITY FOR ANY HARM OR DAMAGES CAUSED BY THE…6 min read·Apr 14, 2023----
Sachin Verlekar“Dumpster Diving”: The most “OUT OF THE ORDINARY” technique used by the threat actorsApart from stealing information from online bank accounts, e-commerce websites etc. Have you ever thought of any hacker who can steal your…3 min read·Jul 1, 2022----
Sachin VerlekarinBootcampAutomatically Jiggle computer mouse using “Keep-Presence” tool.Recently as a part of my own DevOps project, I had deployed a Raspberry pi based DNS server for my home wireless network monitoring and…3 min read·Jan 3, 2022----