h4ckologic Profile Banner
Rajanish Pathak Profile
Rajanish Pathak

@h4ckologic

Followers
2K
Following
7K
Media
85
Statuses
908

Senior Security Researcher | https://t.co/Gkfh7O57Kd | @SynackRedTeam Only my personal views here.!

2130706433
Joined July 2010
Don't wanna be here? Send us removal request.
@h4ckologic
Rajanish Pathak
3 years
An interesting vulnerability discoverd by @hardw00t and me in the cellular component of iOS and its fundamental implementation, which was identified in iOS 14.x and fixed in iOS 15 allowed an attacker to leak sensitive user information was credited by Apple as CVE-2021-31001.
0
3
17
@bsidesahmedabad
Security BSides Ahmedabad
2 months
🌟 CXO Panel Spotlight! 🌟 Apps, Cloud, OT, IoT — the attack surface is massive, and hackers aren’t slowing down. But what if AI becomes the shield we’ve all been waiting for? 🤖⚔️ At BSides Ahmedabad 0x06, we’re diving into the future of defense with our CXO Panel: “Securing
0
13
17
@bsidesahmedabad
Security BSides Ahmedabad
2 months
Cybersecurity leadership is about foresight, precision, and building trust in every layer of technology. We’re glad to welcome @h4ckologic, Senior Manager at Katim, as a CXO Speaker at BSides Ahmedabad 0x06. With his rich experience in advancing secure communication and
0
14
28
@h4ckologic
Rajanish Pathak
3 months
LLMs are as powerful as the human interfacing them.!
1
0
2
@rebane2001
Rebane
1 year
new blogpost time!! this one's a fun writeup on a vulnerability chain i found across multiple google services that earned me a $4133.70 bounty lots of fun css as usual! i had to recreate a bunch of drive/docs/gmail/youtube UIs c: have fun! https://t.co/64ZAIVHoSO
lyra.horse
A writeup of my $4133.70 Google Drive vulnerability chain.
19
169
756
@HackenProof
HackenProof
1 year
3
36
407
@bsidesahmedabad
Security BSides Ahmedabad
1 year
🔓📱 Our latest video is live: 'Hacking into iOS's VoLTE Implementation.' 🎙️Join us as @h4ckologic and Hardik Mehta delve into the intricacies of iOS security and explore the vulnerabilities within VoLTE. 🎥Watch now: https://t.co/BQENjQIot8 #hacking #ios #exploit #VoLTE
0
6
16
@ptswarm
PT SWARM
2 years
🏭 We've tested the new RCE in Microsoft Outlook (CVE-2024-21378) in a production environment and confirm it works well! A brief instruction for red teams: 1. Compile our enhanced DLL 👉 https://t.co/cQWF8KM8vL 2. Use NetSPI's ruler and wait! No back connect required! 🔥 📐📏
4
125
339
@h4ckologic
Rajanish Pathak
2 years
Thanks a lot @bsidesahmedabad for having us at #BsidesAhmedabad0x04 , it was an amazing experience meeting with the Indian hacker community and great minds. Hope to be here again in the future ❤️
0
2
34
@PortSwiggerRes
PortSwigger Research
2 years
We've just published "How to build custom scanners for web security automation", using a recent dive into automated race-condition detection by @albinowax as a case study. Enjoy! https://t.co/iWfOpyoCpX
Tweet card summary image
portswigger.net
In this post, I'll share my approach to developing custom automation to aid research into under-appreciated attack classes and (hopefully) push the boundaries of web security. As a worked example, I'l
3
65
203
@bsidesahmedabad
Security BSides Ahmedabad
2 years
Get ready for an exciting event, everyone! 🚀 Our dynamic Tech Speaker duo, @h4ckologic and Hardik Mehta, has given us a sneak peek into their upcoming talk at the event. 🔍🎤 Get prepared for some incredible insights and thought-provoking discussions! 👽 🔥 Don't wait any
0
8
21
@androidmalware2
Mobile Hacker
2 years
0-days exploited by #Predator spyware were delivered via man-in-the-middle (MITM) attack and 0-click vulnerability against #iOS and #Android In the video below, I demonstrated how an attacker - using just smartphone - can trigger DNS spoofing attack to redirect device on the
30
555
2K
@cybersaiyanIT
Cyber Saiyan | RomHack Conference, Training, Camp
2 years
@KimZetter @terrynini38514 @KlezVirus Rajanish Pathak @h4ckologic and Hardik Mehta @hardw00t “Hacking into the iOS’s VOLTE implementation” 📹 https://t.co/UKyFVm54io 📜 https://t.co/zWr7eTxAhy 5/8 ⬇️
1
3
5
@h4ckologic
Rajanish Pathak
2 years
Thanks a lot @cybersaiyanIT for having us at #Romhack , it was an amazing experience meeting with the Italian hacker community and great minds. Hope to be here again in the future ❤️
3
2
25
@wiz_io
Wiz
2 years
🚨 BREAKING: Wiz Research discovers a massive 38TB data leak by Microsoft AI researchers, including 30,000+ internal Teams messages. Here's what you need to know 🧵
55
864
3K
@citizenlab
The Citizen Lab
2 years
🚨🚨WE URGE EVERYONE TO UPDATE THEIR APPLE DEVICES AS SOON AS POSSIBLE. We have found an actively exploited #zero #click vulnerability that was used to deliver #NSO group’s #Pegasus #spyware. https://t.co/BS0ZI4QuIz
Tweet card summary image
citizenlab.ca
Citizen Lab found an actively exploited zero-click vulnerability being used to deliver NSO Group’s Pegasus mercenary spyware while checking the device of an individual employed by a Washington...
81
2K
4K
@bsidesahmedabad
Security BSides Ahmedabad
2 years
🌌 Brace yourself for an enlightening journey in our highly anticipated Tech Speaker series as we unveil the exceptional insights of @h4ckologic and @hardw00t ! 🎯 They are all set to share their profound wisdom with us at BSides Ahmedabad 0x4, discussing the intriguing topic
1
10
20
@HITBSecConf
HITBSecConf
2 years
ICYMI #HITB2023HKT presentation slides and materials are here: https://t.co/CSeGdVkA0e (more to come... 🙏)
0
27
35
@cybersaiyanIT
Cyber Saiyan | RomHack Conference, Training, Camp
2 years
🔒 Meet Rajanish Pathak (@h4ckologic ) and Hardik Mehta (@hardw00t ) 🔒 “Hacking into the iOS’s VOLTE implementation” Join us at at #Romhack2023 Conference for this talk on the intricacies of VoLTE security! 🎟️ Grab one of the last remaining tickets! https://t.co/WbNkvmcxl2
0
4
8
@cybersaiyanIT
Cyber Saiyan | RomHack Conference, Training, Camp
2 years
Planning on attending #RomHack 2023? You're in luck because you can find Tickets on sale, July 3rd, at 10 AM 👀 They're expected to sell out FAST: grab yours now! 🎟 https://t.co/7qjARU85pT The #RomHack2023 agenda is live and it's 🔥 https://t.co/NzOWxW6XfL See you there? 👀
1
5
12