Somdev SangwanIllusion of Randomness & Exploiting RNGsEntropy, a more scientific term for what we call “randomness” is the measure of uncertainty or disorder. But the question is, how do we…Jul 23, 2019Jul 23, 2019
Somdev SangwanDeblurring images for OSINT — Part 2Let’s reverse Pixelize blur.Jul 12, 20191Jul 12, 20191
Somdev SangwanFinding vulnerabilities in Source CodeAlthough I am not a professional source code auditor but I am a programmer as well as a security researcher. The article is based on my…Jun 29, 20191Jun 29, 20191
Somdev SangwanLearn to code in less than a weekProgramming is an amazing skill to have and I believe it’s essential if you want to be good at information security. With the magic of…Apr 28, 20199Apr 28, 20199
Somdev SangwanHow I found 5 ReDOS Vulnerabilities in Mod Security CRSThis write-up assumes that the reader has intermediate (or higher) knowledge of regular expressions. If you are not very familiar with…Apr 22, 20191Apr 22, 20191
Somdev SangwanExploiting Regular ExpressionsA regular expression (or regex) is basically a search pattern. For example, the expression [cb]atwill match both cat and bat. This isn’t a…Feb 23, 20194Feb 23, 20194
Somdev SangwanUnblurring Images for OSINT and more — Part 1During intelligence operations, we often come across images that may contain important information but they are too blurred, noisy or just…Jan 7, 20194Jan 7, 20194
Somdev SangwanBackdooring Websites with just 35 bytesNinjas need to be stealthy but trading off usability for stealth is a bit expensive. We want our web shell to be able to do everything…Oct 6, 2018Oct 6, 2018
Somdev SangwanCracking eAadhar password in 2 seconds with MathsThis article is already kind of lengthy so let’s get straight to the point.Jul 30, 201822Jul 30, 201822