<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    
    <title>Rashid&apos;s Notes</title>
    
    
    <description>This website is a virtual proof that I&apos;m awesome</description>
    
    <link>https://rashidpulikkuth.github.io/</link>
    <atom:link href="https://rashidpulikkuth.github.io/feed.xml" rel="self" type="application/rss+xml" />
    
    
      <item>
        <title>Configuring Multiple GitHub Accounts on a Single Machine</title>
        <description>
          
          When working on multiple projects, you might want to use different GitHub accounts for each project. Here’s how you can configure Git to use multiple GitHub accounts on the same machine. Step 1: Generate SSH Keys for Each Account First, generate a new SSH key for each GitHub account. You...
        </description>
        <pubDate>Sat, 19 Jun 2021 00:00:00 -0400</pubDate>
        <link>https://rashidpulikkuth.github.io/2021-06-19-configuring-multiple-github-accounts/</link>
        <guid isPermaLink="true">https://rashidpulikkuth.github.io/2021-06-19-configuring-multiple-github-accounts/</guid>
      </item>
    
      <item>
        <title>Android Reverse Enginnering#1</title>
        <description>
          
          I was given two android application to find the flag from it. The flag format is in userid:password. Lets start.. Application 1 : Backdoor1.apk I installed the first application on emulator and the application asks for a username and password. I have to find out that. First, i used apktool...
        </description>
        <pubDate>Sun, 28 Mar 2021 00:00:00 -0400</pubDate>
        <link>https://rashidpulikkuth.github.io/2021-03-28-Androi-Rev-Engineering-1/</link>
        <guid isPermaLink="true">https://rashidpulikkuth.github.io/2021-03-28-Androi-Rev-Engineering-1/</guid>
      </item>
    
      <item>
        <title>Android Root Detection Bypass</title>
        <description>
          
          This is a way, how i bypassed Root Detection while performing retesting of an android application. I hope this will help you on understanding root detection bypass. With less talk lets jump in. Lets start.. I have got a new fixed application which i tested earlier and now i have...
        </description>
        <pubDate>Thu, 28 Jan 2021 00:00:00 -0500</pubDate>
        <link>https://rashidpulikkuth.github.io/2021-01-28-Androi-Root-Detection-Bypass/</link>
        <guid isPermaLink="true">https://rashidpulikkuth.github.io/2021-01-28-Androi-Root-Detection-Bypass/</guid>
      </item>
    
      <item>
        <title>Iptables - Firewall Tool For Linux. Part-1</title>
        <description>
          
          Iptables is a administration tool for packet filtering and NAT or simply it is a firewall tool for linux. Iptables will monitor traffic using tables where rules are defined. There is several diffrent tables, each table contains a number of built in chains and may also contain user defined chains....
        </description>
        <pubDate>Fri, 02 Oct 2020 00:00:00 -0400</pubDate>
        <link>https://rashidpulikkuth.github.io/2020-10-02-iptable-basics/</link>
        <guid isPermaLink="true">https://rashidpulikkuth.github.io/2020-10-02-iptable-basics/</guid>
      </item>
    
      <item>
        <title>Make your SSH More Secure!</title>
        <description>
          
          Secure Shell (SSH) is a network protocol for operating network services securely over an unsecured network. SSH is typically used to login into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports, and X11 connection. In default, an SSH server will listen for incoming connections...
        </description>
        <pubDate>Sun, 27 Sep 2020 00:00:00 -0400</pubDate>
        <link>https://rashidpulikkuth.github.io/2020-09-27-secure-ssh/</link>
        <guid isPermaLink="true">https://rashidpulikkuth.github.io/2020-09-27-secure-ssh/</guid>
      </item>
    
      <item>
        <title>Hack@TheHarbor CTF - Foundations - Networking</title>
        <description>
          
          Hack@TheHarbor was a good CTF. Point3 hosted the CTF on their Escalate platform. I will show you, how i solved all Foundations - Networking challenges. Lets start.. 1 - numberlesslove Download the file to our system, it was a tcpdump capture file contains network data packets. Opened the file using...
        </description>
        <pubDate>Sat, 26 Sep 2020 00:00:00 -0400</pubDate>
        <link>https://rashidpulikkuth.github.io/2020-09-26-hack@theharbor-ctf-network-foundation/</link>
        <guid isPermaLink="true">https://rashidpulikkuth.github.io/2020-09-26-hack@theharbor-ctf-network-foundation/</guid>
      </item>
    
      <item>
        <title>Burpsuite with iOS-HTTP/HTTPS Traffic Intercept</title>
        <description>
          
          Hey guys today i will show you how to intercept http/https traffic from iOS applications using tool called Burpsuite. First of all ensure that your system and iOS device are on the same network. Now open Burpsuite on your system and listen on a port 9001 on all interface. (you...
        </description>
        <pubDate>Mon, 06 Jan 2020 00:00:00 -0500</pubDate>
        <link>https://rashidpulikkuth.github.io/2020-01-06-ioswithburp/</link>
        <guid isPermaLink="true">https://rashidpulikkuth.github.io/2020-01-06-ioswithburp/</guid>
      </item>
    
      <item>
        <title>My Notes about Chisel (Tool for Tunneling)</title>
        <description>
          
          Hey guys today i am sharing my little notes about a insane tool called chisel. Chisel, one of the tool i am using mostly while doing HackTheBox. Thanks to ippsec for teaching me about chisel. Get chisel from here. I will show you some important usages of chisel with example....
        </description>
        <pubDate>Tue, 03 Dec 2019 00:00:00 -0500</pubDate>
        <link>https://rashidpulikkuth.github.io/2019-12-03-chisel-tunneling/</link>
        <guid isPermaLink="true">https://rashidpulikkuth.github.io/2019-12-03-chisel-tunneling/</guid>
      </item>
    
      <item>
        <title>BufferOverflow-#2</title>
        <description>
          
          This is a writeup on how i solved BufferOverflow #2 from NACTF. I hope this will help beginners in binary exploitation while doing ctfs. This is a Beginner level challenge. CTF : https://www.nactf.com/ Lets start.. Download the binary to our system, make it executable and run the binary. Like the...
        </description>
        <pubDate>Mon, 23 Sep 2019 00:00:00 -0400</pubDate>
        <link>https://rashidpulikkuth.github.io/2019-09-23-bufferoverflow-2/</link>
        <guid isPermaLink="true">https://rashidpulikkuth.github.io/2019-09-23-bufferoverflow-2/</guid>
      </item>
    
      <item>
        <title>BufferOverflow-#1</title>
        <description>
          
          This is a writeup on how i solved BufferOverflow #1 from NACTF. I hope this will help beginners in binary exploitation while doing ctfs. This is a Beginner level challenge. CTF : https://www.nactf.com/ Lets start.. Download the binary to our system, make it executable and run the binary. This binary...
        </description>
        <pubDate>Mon, 23 Sep 2019 00:00:00 -0400</pubDate>
        <link>https://rashidpulikkuth.github.io/2019-09-23-bufferoverflow-1/</link>
        <guid isPermaLink="true">https://rashidpulikkuth.github.io/2019-09-23-bufferoverflow-1/</guid>
      </item>
    
      <item>
        <title>BufferOverflow-#0</title>
        <description>
          
          This is a writeup on how i solved BufferOverflow #0 from NACTF. I hope this will help beginners in binary exploitation while doing ctfs. This is a Beginner level challenge. CTF : https://www.nactf.com/ Lets start.. Download the binary to our system, make it executable and run the binary. This binary...
        </description>
        <pubDate>Mon, 23 Sep 2019 00:00:00 -0400</pubDate>
        <link>https://rashidpulikkuth.github.io/2019-09-23-bufferoverflow-0/</link>
        <guid isPermaLink="true">https://rashidpulikkuth.github.io/2019-09-23-bufferoverflow-0/</guid>
      </item>
    
  </channel>
</rss>
