Open in app

Sign in

Medium Logo
Write

Sign in

Tushar Verma
Tushar Verma

103 followers

Home

About

SSRF for Adversaries: Exploiting and Pivoting for Initial Access in Red Team Operations

Mar 15
SSRF for Adversaries: Exploiting and Pivoting for Initial Access in Red Team Operations
SSRF for Adversaries: Exploiting and Pivoting for Initial Access in Red Team Operations
Mar 15

Beyond Vulnerability Management: The CTEM Framework for Next-Gen Cyber Defense

Oct 13, 2024
Beyond Vulnerability Management: The CTEM Framework for Next-Gen Cyber Defense
Beyond Vulnerability Management: The CTEM Framework for Next-Gen Cyber Defense
Oct 13, 2024

Outplay Your Adversary: Red Teaming Tactics for AWS, Azure, and GCP

Introduction

Aug 15, 2024
Outplay Your Adversary: Red Teaming Tactics for AWS, Azure, and GCP
Outplay Your Adversary: Red Teaming Tactics for AWS, Azure, and GCP
Aug 15, 2024

Breaking 2FA Logic for Mass Account Takeover

Mar 14, 2024
Breaking 2FA Logic for Mass Account Takeover
Breaking 2FA Logic for Mass Account Takeover
Mar 14, 2024

Forensic Investigation of Amazon Compromised EC2 Instance

Jul 10, 2023
Forensic Investigation of Amazon Compromised EC2 Instance
Forensic Investigation of Amazon Compromised EC2 Instance
Jul 10, 2023

Exploring Compute Services: EC2

May 23, 2022
Exploring Compute Services: EC2
Exploring Compute Services: EC2
May 23, 2022

All about Business Logic Flaws in Web Applications

Mar 12, 2022
All about Business Logic Flaws in Web Applications
All about Business Logic Flaws in Web Applications
Mar 12, 2022

Docker for Beginners

Jan 14, 2022
Docker for Beginners
Docker for Beginners
Jan 14, 2022

Getting Started With Amazon S3

Jan 2, 2022
Getting Started With Amazon S3
Getting Started With Amazon S3
Jan 2, 2022

Getting started with AWS

Dec 30, 2021
Getting started with AWS
Getting started with AWS
Dec 30, 2021
Tushar Verma

Tushar Verma

103 followers

Security Engineer | Synack Red Team Member

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech