Swipe / Scroll to Navigate

Jithin Pavithran

I have always been curious to know how everything worked.
Over the years, the question has transformed from "How things work?" to "How things break?"!
But whichever be the question, it's the underlying curiosity that makes my everyday thrilling.

I'm a cybersecurity enthusiast specialised in ethical hacking!

Find me at

About me

Articles

🔗 Docked-VPN - A docker based proxy with VPN support

Docked-VPN is a Docker based proxy with support for OpenVPN. It enables you to route only the applications your choice through VPN. For example, you can add VPN to Firefox but not Chrome. With Docked-VPN, using VPN is as simple as connecting to a Proxy. Docked-VPN can be used with any software that support proxy.

📌 Created in Jan 2021

🔗 Working on and off VPN simultaneously (Linux)

Sometimes, you might want to work on and off VPN simultaneously. For example, you might want to be able to visit websites restricted for your country by using a VPN. But at the same time, you might want to stay off-VPN for your regular browsing needs. This could be because you don't want to slow down your regular browsing or you want to keep your default location for this traffic. This article will explain how you can maintain the desired applications on and off VPN seamlessly.

While this article can be used for any application, we will take browsers as examples as browsing is the most common network activity.

📌 Created in Dec 2020

🔗 SSH Port Forwarding

SSH port forwarding is a mechanism in SSH for tunneling application ports from the client machine to the server machine, or vice versa. It can be used for adding encryption to legacy applications, going through firewalls, and some system administrators and IT professionals use it for opening backdoors into the internal network from their home machines. It can also be abused by hackers and malware to open access from the Internet to the internal network.
~ ssh.com
 Created in July 2021

🔗 OAuth 2.0 Flows

The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.
~ IETF
 Created in June 2021

🔗 NTLM in one diagram

Windows Challenge/Response (NTLM) is the authentication protocol used on networks that include systems running the Windows operating system and on stand-alone systems.
~ MSDN Docs
 Created in March 2020

🔗 D-TIME

D-TIME is a runtime obfuscation framework for malware in Windows. The framework was developed as a part of my Master's Project and published in WOOT'19. In addition to D-TIME, the paper also introduces SCBC, a robust covert broadcasting channel for Windows as well as Linux based operating systems.

 Created in Feb 2020

🔗 A closer look at sockets and TCP/IP

Socket programming is easy. Languages like Python provides robust libraries to create and manage sockets and socket communications. However, do you know the packet-level details of the socket library functions/commands that you execute? If you are curious about it, you came to the right place.

The best way to learn is to experiment. So in this article, we will set up a sender, listener and Wireshark to experiment and learn.

 Created in Nov 2019

🔗 Ethical Hacking Workshop

This post about the two-day “Ethical Hacking Workshop” I conducted as a part of Shaastra 2019.

Watching the glittering faces of each participant and their proud in each hack was an amazing experience! Here is a short summary of the workshop.

 Created in Jan 2019

🔗 High bandwidth cache-based covert channel attack

In a typical covert channel attack, we have two processes (a sender and a receiver) trying to communicate with each other though they are not allowed to do so by the security policies. While there are multiple cache-based attacks possible, most of them have extremely low bandwidth.

This article discusses a new variant of the cache-based covert channel attacks that promises a high bandwidth.

 Created in Aug 2018

🔗 Privilege Escalation Attack - Linux (CVE-2017-0358)

This article is a deep dive on CVE-2017-0358. The article starts with an introduction to the attack and then explains the basics of the components present in the attack and finally details the vulnerability and exploit implementation.

Disclaimer: This article is intended for educational purposes only.

 Created in Nov 2017

🔗 Matrix Layer Rotation

This article analyses one of the HackerRank Questions and solves it using simple data structures.

Question: You are given a 2D matrix A (of dimension M×N) and a positive integer R. You have to rotate the matrix R times and print the resultant matrix. Rotation should be in the anti-clockwise direction.

 Created in July 2017

🔗 Easy NPTEL

It's obviously tiring when you have to download all videos of an NPTEL course. This project is aimed at making NPTEL video download effortless. The user just needs to provide the course ID, select the videos to download and sit back and relax.

 Created in Dec 2016

SeedBits

SeedBits