A picture of the author.

Hi, I am Raju Talukder.


Cyber Security Researcher

Cyber Security is an illusion & Researcher is my passion.


View More about me

Blog Posts

Vulnhub Funbox 2 Walkthrough

Vulnhub Funbox 2 Walkthrough

This box is very straightforward; there is nothing complex that we need to know about some tools. From the FTP, we obtained numerous zip files encrypted with passwords. We decrypted...

r@ju r@ju
Vulnhub Funbox 3 Walkthrough

Vulnhub Funbox 3 Walkthrough

This box was quite interesting to me. I found lots of rabbit holes here. Initially, we discovered three applications. The admin application was vulnerable to SQL injection (SQLi), and we...

r@ju r@ju
Vulnhub Five86 2 Walkthrough

Vulnhub Five86 2 Walkthrough

This is the last machine so far from this five86 series. This series proved to be interesting, offering numerous learning opportunities. Among the publicly available ports, FTP and the web...

r@ju r@ju
Vulnhub Mr. Robot 1 Walkthrough

Vulnhub Mr. Robot 1 Walkthrough

Mr. Robot-1

r@ju r@ju
Vulnhub DC-6 Walkthrough

Vulnhub DC-6 Walkthrough

For the initial foothold, we initiated a password brute-force attack based on a custom-generated password list, following a clue provided by the box’s author. After obtaining the password, we were...

r@ju r@ju
Vulnhub DC-5 Walkthrough

Vulnhub DC-5 Walkthrough

This box proved to be quite engaging for me. The initial foothold presented an interesting challenge. Understanding the application’s workflow and identifying a hidden parameter vulnerable to LFI with code...

r@ju r@ju
Connect with me