<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Arun kumar G</title>
    <description>The latest articles on Forem by Arun kumar G (@rudth).</description>
    <link>https://forem.com/rudth</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1760130%2Fc65a2eb3-e8e0-490b-9d02-705743400962.jpg</url>
      <title>Forem: Arun kumar G</title>
      <link>https://forem.com/rudth</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/rudth"/>
    <language>en</language>
    <item>
      <title>Day 0 - Payroll Admin to Ethical Hacker</title>
      <dc:creator>Arun kumar G</dc:creator>
      <pubDate>Sun, 22 Mar 2026 01:53:31 +0000</pubDate>
      <link>https://forem.com/rudth/day-0-payroll-admin-to-ethical-hacker-4l6a</link>
      <guid>https://forem.com/rudth/day-0-payroll-admin-to-ethical-hacker-4l6a</guid>
      <description>&lt;p&gt;Hi everyone! I’m Arun Rudth. For the past 10+ years, I’ve been working as a Payroll Admin.&lt;/p&gt;

&lt;p&gt;But deep inside, I’ve always wanted to do something more meaningful—something that creates impact. That’s when I discovered my interest in Digital Forensics and the role it plays in fighting cybercrime.&lt;/p&gt;

&lt;p&gt;I’ve decided to begin my journey into cybersecurity to learn, grow, and eventually contribute to reducing cybercrimes.&lt;/p&gt;

&lt;p&gt;This blog is my personal space where I’ll share everything I learn, the challenges I face, and the progress I make. I hope this journey motivates not just me, but also anyone out there thinking about starting something new.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>career</category>
      <category>cybersecurity</category>
      <category>devjournal</category>
    </item>
    <item>
      <title>Day 2 - Learning Bug Bounty</title>
      <dc:creator>Arun kumar G</dc:creator>
      <pubDate>Wed, 21 Jan 2026 14:34:31 +0000</pubDate>
      <link>https://forem.com/rudth/day-2-learning-bug-bounty-kpb</link>
      <guid>https://forem.com/rudth/day-2-learning-bug-bounty-kpb</guid>
      <description>&lt;p&gt;Discovering End points and Sensitive Data: Lab: Information disclosure on debug page&lt;/p&gt;

&lt;p&gt;All the websites will not have "robots.txt" to find the flaws, rather we should need to find out the paths by ourself. There are lot of tools available in the internet to find the endpoints of a website. Here we are going to learn about the tools called "Ferox Buster"&lt;/p&gt;

&lt;p&gt;Ferox Buster link: &lt;a href="https://github.com/epi052/feroxbuster" rel="noopener noreferrer"&gt;https://github.com/epi052/feroxbuster&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From the above link we can install this tool for our VM Kali linux, Windows, Linux or Mac OS&lt;/p&gt;

&lt;p&gt;Once installed we should enter the below command to access Ferox buster&lt;/p&gt;

&lt;p&gt;Syntax: ./feroxbuster --url [Target url] -w [wordlist url] &lt;/p&gt;

&lt;p&gt;If above syntax throw error then remove ./&lt;/p&gt;

&lt;p&gt;Target url: &lt;a href="https://0a6600e4033d4feb80b3ea9700090020.web-security-academy.net/" rel="noopener noreferrer"&gt;https://0a6600e4033d4feb80b3ea9700090020.web-security-academy.net/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;wordlist url: &lt;a href="https://github.com/danielmiessler/SecLists/blob/master/Discovery/Web-Content/common.txt" rel="noopener noreferrer"&gt;https://github.com/danielmiessler/SecLists/blob/master/Discovery/Web-Content/common.txt&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Paste it in same root directory to avoid error otherwise you need to mention the exact path to access common.txt&lt;/p&gt;

&lt;p&gt;Once you entered the above command. You will see the open points with various status codes of the target websites.&lt;/p&gt;

&lt;p&gt;200 --&amp;gt; Success -- Positive response&lt;/p&gt;

&lt;p&gt;cgi/bin --&amp;gt; Try access you will see Phpinfo&lt;/p&gt;

&lt;p&gt;Php information of the target website which is massive find. From this we can find the vulnerability of that version of PHPServer.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>tooling</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Day 1 - Learning Bug Bounty</title>
      <dc:creator>Arun kumar G</dc:creator>
      <pubDate>Wed, 21 Jan 2026 13:55:22 +0000</pubDate>
      <link>https://forem.com/rudth/day-1-learning-bug-bounty-1g51</link>
      <guid>https://forem.com/rudth/day-1-learning-bug-bounty-1g51</guid>
      <description>&lt;h2&gt;
  
  
  Discovering Database Login Credentials in Portswigger site:
&lt;/h2&gt;

&lt;p&gt;Lab: Source code disclosure via backup files&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Every website will have robots.txt in it to help search engine to allow/ disallow the path.&lt;/li&gt;
&lt;li&gt;Append the /robots.txt in the url to understand the flaws if any&lt;/li&gt;
&lt;li&gt;In this example we could see as below
User- agent: *
Disallow: /backup&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Meaning for all the users, /backup folder should not be allowed to view.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Next we should append /backup in the url and try to see if there is any leads.&lt;/li&gt;
&lt;li&gt;In this case we could see there is "ProductTemplate.java.bak" file. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8aw0lv30wnkiw6uba7rt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8aw0lv30wnkiw6uba7rt.png" alt=" " width="352" height="155"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;While we access it, we could see this is a Java programmed file which is actual source code.&lt;/li&gt;
&lt;li&gt;If we see the code, there is a connectionbuilder that shows the Postgresql details that include database username and password.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwghr00o0ruktz0lgjcn7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwghr00o0ruktz0lgjcn7.png" alt=" " width="800" height="757"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;We could see the password that listed in this code.&lt;/li&gt;
&lt;li&gt;It is an information disclosure bug that will make us to access the database.&lt;/li&gt;
&lt;li&gt;First way of approach is to try to search the leads thru "robots.txt" url.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Port swigger site link: &lt;a href="https://portswigger.net/web-security/information-disclosure/exploiting/lab-infoleak-via-backup-files" rel="noopener noreferrer"&gt;https://portswigger.net/web-security/information-disclosure/exploiting/lab-infoleak-via-backup-files&lt;/a&gt;&lt;/p&gt;

</description>
      <category>bugbounty</category>
      <category>cybersecurity</category>
      <category>ethicalhacking</category>
      <category>hacker</category>
    </item>
    <item>
      <title>Day 0 - Payroll Admin to Cybersecurity Analyst</title>
      <dc:creator>Arun kumar G</dc:creator>
      <pubDate>Sun, 05 Oct 2025 06:55:50 +0000</pubDate>
      <link>https://forem.com/rudth/day-0-payroll-admin-to-cybersecurity-analyst-47a6</link>
      <guid>https://forem.com/rudth/day-0-payroll-admin-to-cybersecurity-analyst-47a6</guid>
      <description>&lt;p&gt;Hello Everyone!&lt;/p&gt;

&lt;p&gt;I'm Arun Kumar G, and after 10 years of experience as a payroll administrator, I'm embarking on an exciting new journey into the world of cybersecurity. It's a bold shift, but one driven by genuine passion and curiosity.&lt;br&gt;
To stay motivated—and hopefully inspire others walking a similar path—I’ll be sharing my daily learnings through Dev posts. I know transitioning careers isn’t easy, but my interest in cybersecurity burns bright, and I’m committed to keeping that fire alive.&lt;br&gt;
Your support means the world to me. Wish me luck as I dive into this new chapter. Let’s grow together!&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>devjournal</category>
      <category>career</category>
    </item>
  </channel>
</rss>
