Skip to content
SecBytes
Menu
  • Home
  • Sumit Shrivastava (@invad3rsam)
  • Contact Me
Menu

Author: Sumit

Sumit is a security professional working for a consulting company in Middle East. Sumit is involved in various activities including digital forensics, vulnerability assessment, penetration testing and others. Sumit is a security enthusiast and you can follow him on twitter @invad3rsam.

Self-Hosted Kubernetes Cluster in your Home Lab

Posted on September 5, 2023September 5, 2023 by Sumit

Kubernetes has always been tricky deployment for the newbies and setting it up at home requires some beefy hardware with multiple nodes running on it. You can achieve this with K3s which is lightweight version of Kubernetes meant for deployment on home PCs or low-end systems. In this blog, I will be showing you on…

Continue reading

Creating VM Templates in Proxmox

Posted on August 21, 2023August 21, 2023 by Sumit

Virtual machine template is an awesome feature provided by Proxmox. This template can be used to quickly set up a pre-configured virtual machine, minimizing the time required for installation and setup. This is very handy when you want to set up a virtual machine that is similar to the other ones in your environment or…

Continue reading

Before starting to use Proxmox

Posted on August 16, 2023August 16, 2023 by Sumit

In continuation to my previous blog post on Setting up a low-budget home lab, which illustrated the usage of Proxmox to serve as a bare metal operating system to host the virtual machines, it is good to have a few housekeeping done before we start using the platform. This blog post intends for you to…

Continue reading

Setting up a low-budget home lab

Posted on August 11, 2023August 20, 2023 by Sumit

Setting up a server at home is not an easy task, as well is not very pocket friendly. I had been struggling until I came across people setting up servers using used/refurbished thin client machines. In this blog, I will guide you on how you can set up a running server on a thin client…

Continue reading

Blocking Ads on Your Home Network

Posted on August 21, 2020August 21, 2020 by Sumit

Over the years, as the technologies have advanced, so has the online businesses. There are new marketing strategies in place to make businesses bloom. One such marketing strategy is to pick up the information stored on your browsers’ storage and show relevant ads. For people who are more concerned about their online privacy, these ads…

Continue reading

Lab Solution: Me and My Girlfriend 1

Posted on January 5, 2020January 25, 2020 by Sumit

Machine Link: https://www.vulnhub.com/entry/me-and-my-girlfriend-1,409/# Machine Author: TW1C3 (@makegreatagain_) Description (as given by the machine author): This VM tells us that there are a couple of lovers namely Alice and Bob, where the couple was originally very romantic, but since Alice worked at a private company, “Ceban Corp”, something has changed from Alice’s attitude towards Bob like…

Continue reading

Capturing NTLM Hashes using Bettercap

Posted on December 12, 2018December 12, 2018 by Sumit

Recently during an engagement, while I was performing an internal network assessment, I figured out that responder was not able to capture the hashes. Initially I thought that this might be due to some issue with the responder configuration or the options that I am using. After fiddling with it for a while, I started…

Continue reading

Getting system access using malicious word file

Posted on May 23, 2017January 12, 2020 by Sumit

Microsoft Office Word / Wordpad remote code execution vulnerability allows a remote attacker to execute arbitrary code on the system. An attacker can send specially crafted files which can cause the MS Word / Wordpad to download a remote shell and the attacker can gain access of the system. Once, the attacker has control of…

Continue reading

Shielding your browsing activities from the watchdogs

Posted on December 11, 2016December 12, 2016 by Sumit

Nowadays, anything you do in the digital world is being tracked by someone. Either government agencies or the bad guys are always watching you. It’s now easy to shield your activities from these watchdogs.

Continue reading

DDoS Simulation using DNS Aliases

Posted on October 12, 2016December 12, 2016 by Sumit

Background Recently, we encountered a security incident for one of our major BFSI clients. This client was hit by a DDoS attack. The victim received an email the previous day asking them to either pay certain ransom amount or become the victim of this attack. The severity of the attack would increase if the victim…

Continue reading

Recent Posts

  • Self-Hosted Kubernetes Cluster in your Home Lab
  • Creating VM Templates in Proxmox
  • Before starting to use Proxmox
  • Setting up a low-budget home lab
  • Blocking Ads on Your Home Network

Categories

  • Application Security Assessment (2)
  • Capture The Flag (1)
  • CVE (1)
  • DevSecOps (1)
  • Lab Solution (1)
  • Metasploit (2)
  • Miscellaneous (2)
  • Network Penetration Testing (3)
  • Phishing (1)
  • Tips and Tricks (4)

SecBytes

  • GitHub
  • Twitter
  • Facebook

RSS Exploit DB Update

  • [webapps] Wp2Fac - OS Command Injection September 8, 2023
    Wp2Fac - OS Command Injection
  • [webapps] Wordpress Plugin Elementor 3.5.5 - Iframe Injection September 8, 2023
    Wordpress Plugin Elementor 3.5.5 - Iframe Injection
  • [remote] GOM Player 2.3.90.5360 - Remote Code Execution (RCE) September 8, 2023
    GOM Player 2.3.90.5360 - Remote Code Execution (RCE)

Legal

  • Disclaimer
  • Privacy Policy
  • Cookie Policy

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

© 2023 SecBytes | Powered by Minimalist Blog WordPress Theme