2000$ bounty, How I Chained Recon and IDOR to Access 100's of Credit Cards

The author explains how combining reconnaissance and an IDOR vulnerability led to unauthorized access to hundreds of credit card records. Medium.

June 15, 2025 · 1 min · Bhagavan Bollina

Abusing Sysmon Driver Altitude to Evade Detection

In this post, I’ll walk you through a stealthy evasion technique that involves modifying the Sysmon driver’s altitude. how altitudes affect kernel monitoring, and how attackers can abuse this mechanism to disable or crash security tools, without ever touching the EDR itself. ...

June 9, 2025 · 4 min · Bhagavan Bollina

Begin your cloud security journey: Solving Flaws.cloud Part-2

Read the full post on Hacklido.

June 9, 2023 · 1 min · Bhagavan Bollina

Begin your cloud security journey: Solving Flaws.cloud Part-1

Read the full post on Hacklido.

June 4, 2023 · 1 min · Bhagavan Bollina