Avatar 🤖

Gill.Singh.A

Undergraduate Student at IIT Kanpur

  1. Home
  2. Archives
  3. Search
    1. Dark Mode

Archives

2025 4
2024 5

Categories

Hacking Cybersecurity Lateral-Movement Ssh Cracking Development Docker Infosec Mysql Network

Tags

Cybersecurity Infosec Hacking Lateral-Movement Ssh Brute Force Cctv Cracking Development Docker
Featured image of post Dumping Source Code and Accessing Internal Databases via a Phpunit Vulnerability
Hacking Nuclei Php Mysql

Dumping Source Code and Accessing Internal Databases via a Phpunit Vulnerability

Exposed PHPUnit `eval-stdin.php` (CVE-2017-9841) under a web-accessible `vendor` folder allowed file-read payloads to dump site source and reveal DB credentials. Using the compromised host as a pivot, I accessed internal databases and extracted data — ends with practical defensive mitigations for defenders.

Nov 06, 2025
11 minute read
Featured image of post Cracking Linux Hashes and Expanding Access
Ssh Hacking Lateral-Movement Cracking

Cracking Linux Hashes and Expanding Access

In this blog, I’ll walk through how I gained access to multiple machines within an organization by cracking Linux user hashes and leveraging Shodan to identify additional targets. This post will focus on the post-exploitation phase, including hash extraction, cracking, and lateral movement.

Mar 21, 2025
4 minute read
Featured image of post Exploiting Unencrypted Private Keys and Misconfigured SSH Settings to Breach Multiple Systems
Ssh Hacking Lateral-Movement

Exploiting Unencrypted Private Keys and Misconfigured SSH Settings to Breach Multiple Systems

In this post, I'll walk through how I was able to gain unauthorized access to multiple machines by exploiting unencrypted private keys and misconfigured SSH settings.

Feb 24, 2025
3 minute read
Featured image of post Lateral Movement Through SSH Command Tampering
Ssh Hacking Lateral-Movement Network

Lateral Movement Through SSH Command Tampering

In this blog, we will explore how I performed lateral movement and gained access to multiple machines on a private network by logging SSH credentials.

Feb 19, 2025
3 minute read
Featured image of post Building a Heat Map for IIT Kanpur's Computer Labs
Infosec Development

Building a Heat Map for IIT Kanpur's Computer Labs

In this blog, I’ll walk through how I created a heat map for the Linux computer labs at IIT Kanpur. This approach can be applied to any institute or organization with a similar setup.

Sep 24, 2024
3 minute read
1 2
© 2020 - 2025 Gill.Singh.A
Built with Hugo
Theme Stack designed by Jimmy