Nikhil Kumar, a Certified Ethical Hacker, works as a Information Security Consultant. He has experience in web application pen-testing, social engineering, password cracking and android pen-testing. He is also involved with various organizations to help them in strengthening the security of their applications and infrastructure.
-
SecOS: 1 CTF Walkthrough
By Nikhil Kumar on July 26, 2017
-
/dev/random: Pipe CTF Walkthrough
By Nikhil Kumar on June 30, 2017
-
Ew! Skuzzy CTF Walkthrough
By Nikhil Kumar on June 21, 2017
-
/dev/random:Sleepy CTF Walkthrough
By Nikhil Kumar on June 2, 2017
-
BilluBox CTF Walkthrough 2
By Nikhil Kumar on May 19, 2017
-
Writing Exploit for Mini Share Software: Introduction
By Nikhil Kumar on September 14, 2015
-
Analyzing and Writing a Local Exploit 2
By Nikhil Kumar on July 13, 2015
-
Analyzing and Writing a Local Exploit
By Nikhil Kumar on June 18, 2015
-
Dealing with Bad Characters & JMP Instruction
By Nikhil Kumar on May 28, 2015
-
Writing Reverse TCP Exploit
By Nikhil Kumar on May 22, 2015
-
Analyzing Buffer Remotely
By Nikhil Kumar on May 12, 2015
-
Overwriting the Stack
By Nikhil Kumar on April 30, 2015
-
Taking Control of the Process
By Nikhil Kumar on April 23, 2015
-
Stack Based Buffer Overflow in Win 32 Platform: The Basics
By Nikhil Kumar on April 9, 2015
-
Avoiding Mod Security False Positives with White-listing
By Nikhil Kumar on December 4, 2014
-
Analyzing the Mod Security Logs
By Nikhil Kumar on August 12, 2014
-
Configuring the ModSecurity Firewall with OWASP Rules
By Nikhil Kumar on July 18, 2014
-
DOS Deflate: Layer 7 DOS Protection Tool
By Nikhil Kumar on May 27, 2014