Chandravarma Hattaraki

Cyber Security Engineer,Passionate about cybersecurity and technologies, we specialize in network penetration testing, web application security, and bug bounty hunting constantly learning, testing, and securing the digital world.

Connect with us on our social media accounts
YouTube Instagram Facebook Twitter WhatsApp Medium GitHub LinkedIn Hack The Box
Professional Trainings and Certifications
YouTube YouTube
Hero Image

My Blogs & Projects

Automating Bug Bounty with Python

In the world of cybersecurity, bug bounty programs offer a unique opportunity for ethical hackers to find vulnerabilities in organizations’ systems. One of the most critical phases of a bug bounty hunt is reconnaissance, where we gather as much information as possible about the target. In this blog, we’ll explore a Python-based script designed to automate various reconnaissance tasks and finding vulnerebility, making your bug bounty engagement more efficient and systematic.

Python Script to Check Malicious Scores using VirusTotal

Leveraging the VirusTotal API to check malicious scores for IP addresses and file hashes, this blog post will explore how to efficiently use the API for bulk data analysis, thereby streamlining your threat detection process.

Sumo Logic Auto Collector Management Python Script

The Sumo Logic Auto Collector Management Python script is designed to interact with the Sumo Logic API to manage auto collectors, including configuring new collectors and retrieving information about existing ones

SQL Injection

In this section, we’ll explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds of SQL injection vulnerabilities, and summarize how to prevent SQL injection.

My Bug Bounty Reports

SSRF Vulnerebility in Xmlrpc.php

I've successfully reported my first security vulnerability in a bug bounty program—an Unauthenticated Blind SSRF! Unauthenticated Blind SSRF (Server-Side Request Forgery) occurs when an attacker can manipulate a server to make unintended requests to internal or external resources without authentication. Since it’s blind, the attacker doesn’t directly see the response but can infer details through time delays, error messages,or out-of-band interactions

Hack the Box Walkthrough

Oopsie Hack the box

Methods used to exploit Box: Cookie Manipulation, revershell file upload, privilage escalations, Arbitrary File Upload

Archetype Hack the box

Methods: mssql, SMB shares, Privilage escalation, revershell upload via http.server

Vaccine Hack the box

Methods: Anonymous FTP, convert zip to hash, hash cracker, md5 hash cracker, get shell using SQl injection