Lovelesh GangilThe Malicious Maneuvers of Host Header Injection: Exploiting Vulnerabilities and Bypassing SecurityAs discussed in the previous blog I am writing about the impacts of Host Header Injection (HHI) attacks.Mar 14Mar 14
Lovelesh GangilHost Header Injection: The Sneaky Web ThreatImagine you’re browsing your favorite online store, eager to snag that perfect pair of sneakers. The familiar logo, the intuitive interface…Jan 31Jan 31
Lovelesh GangilHTTP/3: The Next Generation of Web PerformanceHTTP/3 is the next major version of the Hypertext Transfer Protocol (HTTP), the protocol that underpins the web. It is based on the QUIC…Oct 1, 2023Oct 1, 2023
Lovelesh GangilUnderstanding HTTP/2: Improving Web Performance with Prioritization and MultiplexingSince the invention of the World Wide Web, HTTP (Hypertext Transfer Protocol) has been the foundation of web communication. The protocol…May 3, 2023May 3, 2023
Lovelesh GangilHack The Box — Tenet — Write upTenet is a Medium difficulty machine that features an Apache web server. It contains a Wordpress blog with a few posts. One of the…Jun 14, 2021Jun 14, 2021
Lovelesh GangilHack The Box — Script Kiddie — Write upScriptKiddie is an easy difficulty Linux machine that presents a Metasploit vulnerability (CVE-2020–7384), along with classic attacks such…Jun 10, 2021Jun 10, 2021
Lovelesh GangilLinux Privilege Escalation ChecklistUser Home Directory EnumerationMay 6, 20211May 6, 20211
Lovelesh GangilTry Hack Me — Investigating Windows — Write UpTask 1 : Investigating WindowsApr 26, 2021Apr 26, 2021
Lovelesh GangilHack The Box — Time — Write UpTime is a medium difficulty Linux machine that features an online JSON parser web application. This application is found to suffer from a…Apr 15, 2021Apr 15, 2021