Subrat Samantaray

379 posts

Subrat Samantaray banner
Subrat Samantaray

Subrat Samantaray

@0xSubrat

CC | CNSP | CCEP | THM Top 5% | Cyber Security Researcher | Red Teamer | Pentester @campustocrypto

127.0.0.1 Katılım Nisan 2022
183 Takip Edilen108 Takipçiler
Subrat Samantaray
Subrat Samantaray@0xSubrat·
Pentest pricing: The more you know, the more expensive you become 😂
Subrat Samantaray tweet media
English
0
0
1
15
Subrat Samantaray retweetledi
Bug Bounty Village
Bug Bounty Village@BugBountyDEFCON·
IT'S GIVEAWAY SEASON! We will pick 6 winners to win one of the following: 1x Annual VIP Hack The Box Licence 5x Pentesterlab 3 Month Licences To enter: 1️⃣ Follow us @BugBountyDefcon 2️⃣ Like this post ❤️ 3️⃣ Tag 3 hacker friends in the comments 4️⃣ Retweet this post 🔁 Giveaway open until Thursday May 14th! GOOD LUCK!
Bug Bounty Village tweet media
English
167
178
317
20.3K
Subrat Samantaray retweetledi
Arcenpay
Arcenpay@arcenpayhq·
This is just the beginning. @arcenpayhq
English
0
5
13
847
Pratik Das
Pratik Das@PratikDas54548·
Completed DeFi Protocols Learned: • ERC20 tokenization • Stablecoin mechanisms • Collateral, Minting, Health Factor, Liquidation • Oracle heartbeat & stale price risks • Stateless vs Stateful testing • Stateful fuzz testing (Handler) #Web3 #DeFi #Solidity #Foundry
Pratik Das tweet media
English
1
0
1
41
Subrat Samantaray
Subrat Samantaray@0xSubrat·
@MontyBehra Smart move—turning defense into deception 👏 ESP32 honeypot with Telegram alerts is a clean and effective idea. Curious if you're logging attack patterns for analysis?
English
1
0
1
35
S.MKT 📟
S.MKT 📟@MontyBehra·
Developed an IoT Honeypot on an ESP32 Using Telegram🪤: Instead of blocking attackers, lure them into a trap. I deployed a fake login page on the ESP32, which generates alerts on two source phones, sends notifications via Telegram, and displays messages on an LCD screen.
English
1
0
1
89
Subrat Samantaray retweetledi
Intigriti
Intigriti@intigriti·
| ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄| every successful hacker had to start somewhere |______________| \ (•◡•) / \ / —— | | |_ |_
English
22
54
457
13.7K
Subrat Samantaray
Subrat Samantaray@0xSubrat·
Just rooted HackTheBox Season 10 – Facts 💻🔓 Chained web vuln (CVE) → AWS key leak → S3 enum → SSH access → sudo misconfig → root via facter. A perfect example of how small misconfigurations can lead to full compromise. #HackTheBox #CyberSecurity #CTF #Pentesting
Subrat Samantaray tweet media
English
0
0
3
110
Subrat Samantaray
Subrat Samantaray@0xSubrat·
+1 today 🎂 thankful for everything so far.
Subrat Samantaray tweet media
English
0
0
0
22
Subrat Samantaray
Subrat Samantaray@0xSubrat·
Free tier. Real skills. 💥 Cleared multiple HTB Starting Point machines (Meow, Fawn, Dancing, Redeemer) Building from the ground up—one box at a time. #HTB #EthicalHacking #CyberSec
Subrat Samantaray tweet mediaSubrat Samantaray tweet mediaSubrat Samantaray tweet mediaSubrat Samantaray tweet media
English
0
0
1
24
Subrat Samantaray
Subrat Samantaray@0xSubrat·
DEFCON Pune CTF in progress ⚔️ Top 9 (for now) — let’s see where it ends 🚀 #CTF #InfoSec
Subrat Samantaray tweet media
English
1
0
3
76
Subrat Samantaray
Subrat Samantaray@0xSubrat·
First CTF experience and it was 🔥 Participated in DEFCON Pune’s CTF7 on March 28, secured 10th place and captured 17/31 flags 🏁 Learned a lot, broke a lot, and definitely got hooked 😄 This is just the beginning. #CTF #CyberSecurity #DEFCON #LearningByDoing
Subrat Samantaray tweet mediaSubrat Samantaray tweet media
English
0
0
1
54
Subrat Samantaray
Subrat Samantaray@0xSubrat·
🧠 Final Takeaways: > Enumeration is the most critical phase > Version detection reveals real vulnerabilities > Weak configs + known exploits = full compromise > Data exfiltration is the real objective Think like an attacker ⚡ #EthicalHacking #RedTeam
English
0
0
0
31
Subrat Samantaray
Subrat Samantaray@0xSubrat·
Step 10: Data Exfiltration cd /home/msfadmin/test ls → found test.txt download test.txt File successfully extracted 📥 Goal of attacker: Access + extract sensitive data.
Subrat Samantaray tweet media
English
1
0
0
5
Subrat Samantaray
Subrat Samantaray@0xSubrat·
Doing FTP Enumeration & Exploitation Target: 192.168.29.157 (Metasploitable) Objective: → Identify services → Find misconfigurations → Exploit vulnerabilities → Extract data Full attack chain breakdown 👇 #CyberSecurity #Pentesting
English
1
0
1
21