Skip to main content


Showing posts from 2018

How to enable monetization in youtube channel

You can apply for monetization at any time. To be reviewed, all channels need at least 4,000 watch hours in the previous 12 months and 1,000 subscribers. This requirement allows us to properly evaluate new channels and helps protect the creator community.

Video: How to make Kali Linux bootable pen drive from ubuntu

This video explains how to make a Kali linux bootable USB drive using any Ubuntu installation

Rs 1000 off on Redmi 6A: Specs, and Reviews, and buy online

Camera: 13 MP Rear camera | 5 MP front camera Display: 13.84 centimetres (5.45-inch) HD+ display with 1440x720 pixels, 295 pixel density and 18:9 aspect ratio Memory, Storage & SIM: 2GB RAM | 32GB storage expandable up to 256GB with dedicated slot | Dual nano SIM with dual-standby (4G+4G) Operating System and Processor: Android v8.1 operating system with Mediatek Helio A22, 2.0Ghz Quad core processor with 12nm technology Battery: 3000 mAH lithium Polymer battery Warranty: 1 year manufacturer warranty for device and 6 months manufacturer warranty for in-box accessories including batteries from the date of purchase Included in box: Adapter, USB Cable

Buy here:

Best smart phones on offers- December 2018: Specs, Compare and buy online

Honor 7C (Blue, 4GB RAM, 64GB Storage)

Camera: 13+2 MP Dual rear camera | 8 MP front camera with f2.0 aperture with soft selfie toning light Display: 15.2 centimeters (5.99-inch) HD+ Full view LED capacitive touchscreen display with 720x1440 pixels, 268 ppi pixel density and 18:9 aspect ratio Memory, Storage & SIM: 4GB RAM | 64GB storage expandable up to 256GB | Dual nano SIM with dual standby (4G+4G) Operating System and Processor: Android v8.0 EMUI Oreo operating system with 1.8GHz Qualcomm Snapdragon 450 octa core processor Battery: 3000 mAh lithium Polymer battery providing talk-time of 16 hours with stand by upto 349 hours Warranty: 1 year manufacturer warranty on handset and 6 months on battery/charger, 3 months on accessories (data cable) provided by the manufacturer from date of purchase Included in box: Charger, USB 2.0 cable, TP Protec…

Become a Bug bounty tutorial: Unit 4: Base64 Encoding

Base64 EncodingSummary:  Most web applications make use of Base64 encoding for transmitting binary data within cookies and other parameters, and even for obfuscating sensitive data to prevent trivial modification.  You should always look out for, and decode, any Base64 data that is issued to the client. Base64-encoded strings can often be easily recognized from their specific character set and the presence of padding characters at the end of the string.

Explanation: Base64 encoding allows any binary data to be safely represented using only printable ASCII characters. It is commonly used for encoding email attach- ments for safe transmission over SMTP, and is also used to encode user cre- dentials in basic HTTP authentication. Base64 encoding processes input data in blocks of three bytes. Each of these blocks is divided into four chunks of six bits each. Six bits of data allow for 64 different possible permutations, and so each chunk can be represented using a set of 64 characters. Bas…

Become a Bug bounty tutorial: Unit 3: HTML Encoding

HTML Encoding Summary: While penetration testing a web application, your main interest in HTML
encoding is likely to be when probing for cross-site scripting vulnerabilities.

If one application returns user input unmodified within its responses, then it is
probably vulnerable, whereas if dangerous characters are HTML-encoded
then it is probably safe

HTML encoding is a scheme used to represent problematic characters so that
they can be safely incorporated into an HTML document. Various characters
have special meaning as meta-characters within HTML and are used to define
the structure of a document rather than its content. To use these characters
safely as part of the document’s content, it is necessary to HTML-encode them.
HTML encoding defines numerous HTML entities to represent specific lit-
eral characters, for example:

"  “
'  ‘
&   &
&lt;    <
&gt;    >

Become a Bug bounty tutorial: Unit 2: Unicode Encoding

Unicode Encoding For the penetration testing on web applications, Unicode encoding is very important because it can sometimes be used to defeat input validation

How it works:
If an input filter blocks certain malicious expressions, but the
component that subsequently processes the input understands Unicode
encoding, then it may be possible to bypass the filter using various standard
and malformed Unicode encodings.

Unicode is a character encoding standard that is designed to support all of the
writing systems used in the world. It employs various encoding schemes, some
of which can be used to represent unusual characters in web applications.
16-bit Unicode encoding works in a similar way to URL-encoding. For
transmission over HTTP, the 16-bit Unicode-encoded form of a character is the
%u prefix followed by the character’s Unicode code point expressed in hexa-
decimal. For example:

%u00e9  é
%u2215  /

UTF-8 is a variable-length encoding standard that employs one or more

Become a Bug bounty tutorial: Unit 1: URL Encoding

URL Encoding
URLs are permitted to contain only the printable characters in the US-ASCII
character set.

That is, those whose ASCII code is in the range 0x20–0x7e

Further, several characters within this range are restricted because
they have special meaning within the URL scheme itself or within the HTTP

The URL encoding scheme is used to encode any problematic characters
within the extended ASCII character set so that they can be safely transported
over HTTP. 

The URL-encoded form of any character is the % prefix followed by
the character’s two-digit ASCII code expressed in hexadecimal. Some exam-
ples of characters that are commonly URL-encoded are shown here:

%3d  =
%25  %
%20  space
%0a  new line
  null byte

A further encoding to be aware of is the + character, which represents a URL-
encoded space (in addition to the %20 representation of a space).

You will often need to use these characters with their special
meaning when modifying a request.

For eg: To add an addit…

Google Vulnerability Rewards based on Severity and catgories

Dear Readers, I have just started reporting bugs to google bug hunting program, at And my first reporting was accepted as a bug! I recommend all my friends to take bug hunting as a job or part time job if you are interested in internet security and also googles hall of fame and nice rewards! Please feel free to comment below if you have any questions about how to start bug hunting. The Reported bugs are categorized as P0 to P4 and S0 to S4 Below are the reward amounts for accepted vulnerabilities: Reward amounts for security vulnerabilitiesRewards for qualifying bugs range from $100 to $31,337. The following table outlines the usual rewards chosen for the most common classes of bugs: CategoryExamplesApplications that permit taking over a Google account [1]Other highly sensitive applications [2]Normal Google applicationsNon-integrated acquisitions and other sandboxed or lower priority applications [3]Vulnerabilities giving direct acc…

How to create openwrt firmware for unsupported wifi routers

This explains how to create a firmware for an unsupported device you have. For example, D-Link DIR-816 A1

To get a  minimal list of files required to add a new board use this command:

#grep -lri DIR816-A1 target/

the list of files will be like:


Edit these files to get the required configuration.

use this command to reset the make file:
touch target/linux/*/Makefile

D-Link DIR-816 Tech pictures, Specs, and firmware

We are developing a custom firmware based on openwrt for this router. Please comment below if you would like to get updates about this.

Device Hardware Specs:
D-Link DIR-816 A1 Part number: OIR816IEU-A1E Availability: India
Manuf/OEM/ODMSGE AP699E8C .CW125A Series: AC750 CPU1:MediaTek MT7620A(580 MHz) Update: RAM1: 512Mb winbond w9751g6kb-25 8M * 4 Banks* 16Bit DDR2 SDRAM