Kuldeep Pandya

1.2K posts

Kuldeep Pandya banner
Kuldeep Pandya

Kuldeep Pandya

@kuldeepdotexe

OSINT | Web | Binary | [email protected] | @SynackRedTeam Envoy && Hero

Katılım Eylül 2015
356 Takip Edilen4.9K Takipçiler
Kuldeep Pandya retweetledi
Barracks
Barracks@BarracksArmy·
One of our own just hit their first 3-digit bounty. 🛡️ Every bounty has a story behind it. Late-night testing. Duplicates. Learning from labs. Community support. From learning web security fundamentals… to solving labs… to attending community events… to facing multiple duplicates before finally landing a valid bounty. This is the journey most researchers go through - persistence is the real skill. Huge congratulations on the milestone and thank you for sharing the journey. We’re proud to see members of the Barracks community turning learning into real impact. Welcome to the growing list of Barracks Graduates. Full story in the comments 👇
Barracks tweet mediaBarracks tweet media
English
2
4
37
1.8K
Kuldeep Pandya retweetledi
Barracks
Barracks@BarracksArmy·
What is the problem with CTF ? CTF is a good way to test your hacking skill . You following the clues given in the problem to find a hidden flag can be fun . But it's really not sufficient To be a good hunter . You need to practice your skills in an environment where you are left helpless and you need to build a path your way out. In CTFs you know you are supposed to just find a flag and move on but in real world you are not chasing flags. You chase vulnerabilities. How Warzone helps? Warzone is a specially crafted vulnerable environment designed by Barracks. Where you are provided a vulnerable environment with no clues . You need find your own way and find vulnerabilities. And it's not like normal CTFs you find a flag and never look again . It's a warzone found a vulnerability hunt for the next one. This gives you proper insight how to think as a hunter and you also get to report the vulnerability like a real test report . Your report is assessed by the barracks and it reflects what you need to focus on . And where your skills lacks. If you want to test your real ability, visit app.barracks.army and step into a WarZone. #CyberSecurity #bugbountytip #cyberpunk
Barracks tweet media
English
0
3
5
307
Kuldeep Pandya retweetledi
Barracks
Barracks@BarracksArmy·
Cybersecurity Hiring is Blind. Resumes don’t measure real Vulnerability Discovery. Interviews don’t show "Thinking" under pressure. Two identical CVs can perform very differently live. Security is not an exam. It’s not just what you know. It’s how you think, adapt, and execute when things aren’t clear. That gap is costing the Industry. At Barracks, We measure how they "think", not just what they find. Observe performance. Don’t assume Skill. #CyberSecurity #Securitycareers #Infosec
Barracks tweet media
English
1
2
6
420
Kuldeep Pandya retweetledi
Barracks
Barracks@BarracksArmy·
Weekend is Here. And so is the Micro Wz (calling it Blitz for now) - Barracks Blitz 0x02🔥 Missed the last one? Don't lose this. See you in the WarZone. #bugbounty #infosec #CyberSec
Barracks tweet media
English
1
2
5
467
Kuldeep Pandya retweetledi
Barracks
Barracks@BarracksArmy·
We just introduced Report Disclosure at Barracks. What does it mean? You now get access to real, verified disclosed vulnerability reports. Not AI-generated writeups. Not “Boom P1 in 5 mins.” Actual reports. Accepted. Validated. Real. Why does this matter? Because methodology isn’t built by watching content. It’s built by dissecting real findings. With Report Disclosure, you can: • Study real recon depth • Understand how impact was validated • See how researchers structured their submissions • Learn what worked - and what didn’t This is where confidence is built. This is where serious hunters separate themselves. And this is just one part of it. Barracks provide hyper-realistic, ambiguous enterprise environments (WarZone) where you can test and sharpen your hunting skills.
Barracks tweet media
English
2
2
12
2.3K
Kuldeep Pandya retweetledi
Debangshu 🇮🇳🥷
Debangshu 🇮🇳🥷@ThisIsDK999·
For years, security tools told us IPv6 was "too large to scan" and "not worth worrying about yet." Every vendor knows IPv6 exists. Every vendor knows modern infrastructure is dual-stack. Every vendor knows attackers actively scan IPv6 space. And every vendor is praying you don’t ask about their IPv6 coverage. While most ASM platforms stayed IPv4-only, IPv6 quietly became the largest unmanaged attack surface on the internet. Today, we’re introducing @defndit - a dedicated IPv6 monitoring platform, bundled with Attack Surface Management, built on real-world IPv6 research. We regularly scan 500M+ IPv6 addresses, surfacing exposed and misconfigured deployments. Join the waitlist for free. Register with your corporate or organization email address at defndit.com.
Debangshu 🇮🇳🥷 tweet media
English
3
13
95
25.8K
Kuldeep Pandya retweetledi
Barracks
Barracks@BarracksArmy·
There is a fundamental lie being sold to the next generation of Hackers: "If you can break the box, you can secure the Enterprise." False. Hacking a "Lab/Box" proves you have Memory (Tool syntax, CVE knowledge, known exploits). Securing an enterprise requires Mindset (Logic analysis, Risk context, Resilience). Most hiring pipelines are completely blind to this difference. They look at your Resume wanting a generic "Security Analyst." This creates the Visibility Gap. It means the Tacticians (The Engines of Coverage who ensure assurance) get rejected for not being "1337" enough. It means the Strategists (The Engines of Novelty who find critical logic flaws) get rejected for "lack of process." At #IdentityShield this week by @miniOrange_Inc, Barracks is unveiling the ultimate Candidate Report through our WarZones. This is not a scorecard. It is a forensic analysis of your Tradecraft. We don't just track what you found. We track who you are when the pressure is on: - The Tactician: Do you map every endpoint? Do you verify every patch? You are the bedrock of scale. - The Strategist: Do you focus only on a few modules? Do you chain minor bugs into critical breach? Do you report Cookie exfils instead of just popups? You are the spear of Resilience. Both are elite. But the Industry treats them as identical. We provide the data to prove the difference. If you are a wannabe Hacker tired of Labs not getting you "ready" enough, or you're a Leader or CISO wanting to de-risk your Talent & ready to validate your team's true archetype against real-world production logic: 📍 Barracks Command Center @ IdentityShield, Pune. T-Minus 2 Days. #IdentityShield #RedTeam #AppSec #Barracks #WarZone #Hacking
Barracks tweet media
English
0
1
4
393
Kuldeep Pandya retweetledi
RogueSMG
RogueSMG@RogueSMG·
The "Experience Paradox" has forever been a nightmare in this Industry. I've been in infosec since around half a decade now. And I speak to a lot of friends, hackers, students, and bug hunters every month. The story is more or less always the same, even after all these years: - Pulling all nighters to Grinds CTFs & Labs. - Save up cash to buy "Industry Standard" Certs. - Learn the tools, the scripts, and the syntax. Thanks to AI, barely even Syntax anymore. And then you apply for a "Junior/Fresher" role. And: Rejected. Worse, no callback or no one even reached back out to you. With the reason: "Not enough real-world experience." But you can't get experience without the job. And you can't get the job without experience. Even I started my Career with CTFs, and bookmarking every random #bugbountytip, gathering courses and what not. And I've been there in there in this loop. So you go back to the Labs. You solve more boxes. You hack more "intended solutions." You get better at the Game, but you aren't getting closer to the Job. Why? Because the Managers & Leads knows CTFs aren't reality. And they've learnt that the hard way, by making mis-hires. CTFs are great for clearing concepts. But in a CTF, there is a flag. There is a solution. The puzzle was designed to be solved. In Production? It’s messy. It’s boring. It’s undocumented. There are no flags. There is only broken Logic and Business Risk. And 2 out of 2000 things might* be broken. The gap between "Top 1% on a Platform" and "Useful in a SOC/VAPT" is massive. And right now, there is no bridge. We built @BarracksArmy to burn that bridge and build a ramp. We're brining the WarGames to #IdentityShield by @miniOrange_Inc this week. Real infrastructure. Zero hints. Zero flags. We don't care about your certs or years of experience. We care about your Mindset. And so should the Infosec Industry from a Hiring perspective. Are you a Tactician (Coverage & Consistency)? Or are you a Strategist (Novelty & Impact)? If you are stuck in the loop - tired of labs, tired of rejections, and ready to prove you can handle the chaos of production, don't just join the WarGames (need to be present at the Summit). Come find me - We have a booth in the WarGames area. I would love to know more about you and try to better understand the problems you are facing. Let’s get you out of the loop and get you a taste of Reality. If you're a Founder, Hiring Manager, or a someone managing an Infosec team, I'd love to connect, hear your views and talk about de-risking current Infosec Hiring. And we also just might* have something for everyone as well😉 #Infosec #BugBounty #Hiring #CyberSecurity #Barracks
RogueSMG tweet media
English
1
1
14
1.5K
Kuldeep Pandya retweetledi
RogueSMG
RogueSMG@RogueSMG·
My 2 cents on the resurfaced Bug Bounty Creator/Courses hate. While I agree that: 1. No false claims, and 2. No force to buy ...solves most of the problems. Millions of Math teachers in the World. Every math teacher isn't a Mathematician, doesn't make them unqualified to teach. And mindless hate is certainly NOT okay. But from the other end, the "warnings" and folks speaking out are because they probably care about the end users. It might not be a scam per se, but the value created isn't worth more than a quick google search. As a beginner, everything feels like "Magic" and they keep looking for Shortcuts and that Magic pill to take which'll suddenly make everything click. I have been there. So the realisation only happens after some time in the field that the random 20/50/150$ course or Bug Bounty Bundle was barely anything. And selling Dreams will never stop. Because the demand won't, that's just Human nature - we love shortcuts. I've seen several unworthy courses and what not by not-so-genius folks. Literally running personal Instagram, Facebook, etc. Ads and what not, but yet going strong since forever. Not because there's value, but the Target end user is always there in the funnel. 20, 30, 50$ etc. might be nothing for some, and maybe life changing for the other. We cannot correct the Moral compass of everyone or anyone for that matter. But we certainly can try to make the consumers aware of the situation rather than just watching from the sidelines. Not to hate, but maybe to save them those bucks to be better invested elsewhere with much better ROI - VPS, Burp/Caido, etc. or even health, family, or so. It's just about awareness. Because ultimately, it's their choice afterall. #bugbounty
English
1
6
43
8K
Kuldeep Pandya retweetledi
Barracks
Barracks@BarracksArmy·
Bsides Vadodara 2026 ⚡
Barracks tweet media
English
0
2
12
1.1K
Kuldeep Pandya retweetledi
İSHİKA ☆
İSHİKA ☆@chmodx1sh·
Back to the bounty game after a long break. Thankyou RadhaKrishna 🩷 @Bugcrowd 🩷
İSHİKA ☆ tweet media
English
9
5
158
6.5K
Kuldeep Pandya retweetledi
RogueSMG
RogueSMG@RogueSMG·
I just came across this neat Bug report (HackerOne #1849626) by @iangcarroll on @stripe Basically they were given a one-time $20,000 fee discount. By replaying the API call, they stacked the offer and claimed $600,000 in fee free processing! This Report is a perfect, real-world example of the two Core Talent Archetypes we see in Security: • The "Tactician": The essential, high-volume practitioner who finds foundational flaws (like XSS, CSRF, misconfigs), and follows a meticulous checklist. They are masters of Coverage and execution. • The "Strategist": They think in terms of the Business logic. They simply asked, "What happens if I use this one-time offer... twice?" They didn't find a complex code bug. Rather they found a catastrophic flaw in the System's Logic. A "Tactician" mindset might have missed this. A "Strategist" mindset caught it. From a Business standpoint, Companies need both archetypes to be secure. The problem is, a traditional Resume, Interview or CTF is completely blind to this distinction. The real Risk isn't just the flaw, it's not knowing who on your team has the mindset to serve or address the relevant Business need: Coverage or Novelty. #AppSec #BugBounty #CyberSecurity #BusinessLogic
English
3
13
205
14.3K
Kuldeep Pandya retweetledi
Mayur Parmar 
Mayur Parmar @th3cyb3rc0p·
Secured 1st position among 43 participants in the Breach The Barracks WarZone competition. Played such a CTF-style event after 5 long years and it wasn’t the usual one.
Mayur Parmar  tweet mediaMayur Parmar  tweet media
English
0
2
6
1.2K
Kuldeep Pandya retweetledi
Barracks
Barracks@BarracksArmy·
Mumbai, get ready. 🎯 We're deploying a custom, no-flags, bug-bounty style WarZone for the BreachForce community tomorrow, Oct 18th. This is your chance to move beyond the theory. Hunt real bugs, write real reports. The Mission: Breach The Barracks WarZone 💀 RSVP link below. #BugBounty #infosec
Barracks tweet media
English
1
1
10
3.7K
Kuldeep Pandya retweetledi
watchTowr
watchTowr@watchtowrcyber·
The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) labs.watchtowr.com/well-well-well…
English
5
136
383
96K