<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://bikramkharal.com.np/</id><title>Bikram Kharal</title><subtitle>Portfolio website of Bikram Kharal also known as themarkib.</subtitle> <updated>2025-09-15T08:49:40+05:45</updated> <author> <name>Bikram Kharal</name> <uri>https://bikramkharal.com.np/</uri> </author><link rel="self" type="application/atom+xml" href="https://bikramkharal.com.np/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://bikramkharal.com.np/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2025 Bikram Kharal </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>My journey to OSCP/ OSCP+</title><link href="https://bikramkharal.com.np/posts/oscp/" rel="alternate" type="text/html" title="My journey to OSCP/ OSCP+" /><published>2025-09-14T18:40:00+05:45</published> <updated>2025-09-14T18:40:00+05:45</updated> <id>https://bikramkharal.com.np/posts/oscp/</id> <content type="text/html" src="https://bikramkharal.com.np/posts/oscp/" /> <author> <name>themarkib</name> </author> <category term="Certification" /> <category term="OSCP" /> <summary>Hello everyone, Hi, I’m Bikram Kharal, a cybersecurity enthusiast and penetration tester with a strong interest in ethical hacking, network security, and offensive security. My journey into cybersecurity started with curiosity about how systems work and how they can be broken, which eventually grew into a passion for protecting them. Over time, I’ve worked on sharpening my skills in penetrati...</summary> </entry> <entry><title>Subdomain takeover via AWS s3 bucket</title><link href="https://bikramkharal.com.np/posts/aws-subdomain-takeover/" rel="alternate" type="text/html" title="Subdomain takeover via AWS s3 bucket" /><published>2024-05-29T18:40:00+05:45</published> <updated>2024-05-29T18:40:00+05:45</updated> <id>https://bikramkharal.com.np/posts/aws-subdomain-takeover/</id> <content type="text/html" src="https://bikramkharal.com.np/posts/aws-subdomain-takeover/" /> <author> <name>themarkib</name> </author> <category term="Subdomain Takeover" /> <category term="Bug Bounty" /> <summary>Hello guys, Today we are going to talk about the Subdomain takeover vulnerability which can be easily identified and exploited by attackers causing maximum impact to the organization. Subdomain takeover is a common vulnerability that allows an attacker to gain control over a subdomain of a target domain and redirect users intended for an organization’s domain to a website that performs malici...</summary> </entry> <entry><title>HTB - Headless</title><link href="https://bikramkharal.com.np/posts/headless/" rel="alternate" type="text/html" title="HTB - Headless" /><published>2024-05-14T18:40:00+05:45</published> <updated>2024-05-14T18:40:00+05:45</updated> <id>https://bikramkharal.com.np/posts/headless/</id> <content type="text/html" src="https://bikramkharal.com.np/posts/headless/" /> <author> <name>themarkib</name> </author> <category term="Hack The Box" /> <category term="CTF" /> <summary>Hello Guys, It’s me Bikram Kharal back in medium to write about the Seasonal machine of the Hack The Box. Initial Enumeration First of all i did a simple nmap scan to enumerate all the ports in the box. nmap -sC -sV Machine_IP -T4 I found that open ports are 22 and 5000. I saw that port 5000 is running a web service.Visiting that location we got a interface like below: Clicking on F...</summary> </entry> <entry><title>HTB - Bizness</title><link href="https://bikramkharal.com.np/posts/htb-bizness/" rel="alternate" type="text/html" title="HTB - Bizness" /><published>2024-01-23T18:40:00+05:45</published> <updated>2024-01-23T18:40:00+05:45</updated> <id>https://bikramkharal.com.np/posts/htb-bizness/</id> <content type="text/html" src="https://bikramkharal.com.np/posts/htb-bizness/" /> <author> <name>themarkib</name> </author> <category term="Hack The Box" /> <category term="CTF" /> <summary>Hello everyone,It’s me Bikram Kharal here to write a about a easy hackthebox machine called as Bizness.Lets’ start : Initial Enumeration First of all i did a simple nmap scan to enumerate all the ports in the box.Here few ports like 22,80,443 seems interesting. I added https://bizness.htb/ to /etc/hosts in my linux machine. Enumerating Bizness Website Visiting the website we found it...</summary> </entry> <entry><title>My first Web Cache Poisoning bug</title><link href="https://bikramkharal.com.np/posts/cache-posioning/" rel="alternate" type="text/html" title="My first Web Cache Poisoning bug" /><published>2024-01-16T18:40:00+05:45</published> <updated>2024-01-16T18:40:00+05:45</updated> <id>https://bikramkharal.com.np/posts/cache-posioning/</id> <content type="text/html" src="https://bikramkharal.com.np/posts/cache-posioning/" /> <author> <name>themarkib</name> </author> <category term="Bug" /> <category term="Bug Bounty" /> <summary>Web cache poisoning is an advanced technique where by an attacker exploits the behavior of a web server and cache so that a harmful HTTP response is served to other users. How does a web cache work? To understand how web cache poisoning vulnerabilities arise, it is important to have a basic understanding of how web caches work. If a server had to send a new response to every single HTTP req...</summary> </entry> </feed>
