☣ About

I am a young independent security researcher who is very passionate about application security since I was a kid. I am very interested in reverse engineering, exploit development and penetration testing. I started my life with a single quote ? at the age of 12. I’m not any nerd or any geek. Just a normal boy who loves to explore new things. Apart from that I love music.

I got acknowledged by many organizations including Microsoft, Apple, AT&T, Oracle, Adobe, Facebook, Nokia, Twitter, Sony, Ebay, SoundCloud, RedHat, Github, Huawei, Dell, Samsung, Intel, etc.

Me in the news and other mentionings

 

  • The tool LFiFreak which I wrote when I was 18 featured in Pentester Academy TV

Interviews

Research

Author of BreakThiSQLi challenge series.

All my work included here are licensed under
Creative Commons Attribution-ShareAlike 3.0 Unported License

🌎 Contact me

Buy Me A Coffee

Currently Holds:

CREST

  • CREST Registered Penetration Tester (CRT Pen)
  • CREST Practitioner Security Analyst (CP SA)

Offensive Security

eLearnSecurity

  • eCRE – eLearnSecurity Certified Reverse Engineer
  • eCXD – eLearnSecurity Certified eXploit Developer
  • eCPPTX – eLearnSecurity Certified Professional Penetration Tester Extreme
  • eWPTXv2 – eLearnSecurity Web Application Penetration Tester Extreme v2
  • eWPTX – eLearnSecurity Web Application Penetration Tester Extreme
  • eCPPTv2 – eLearnSecurity Certified Professional Penetration Tester v2
  • eCPPT Gold – eLearnSecurity Certified Professional Penetration Tester (Gold)
  • eWPT – eLearnSecurity Web Application Penetration Tester

Pentester Academy

Zero-Point Security

Coursera

  • Software Security – University of Maryland
  • Cryptography – University of Maryland
  • Hardware Security – University of Maryland
  • Usable Security – University of Maryland

edX

  • Introduction to Computer Science and Programming Using Python – MIT
  • Embedded Systems – Shape the World – University of Texas
  • Introduction to Linux – The Linux Foundation

PentesterLab

  • PentesterLab White Hat Badge
  • PentesterLab Serialize Badge

The CryptoCurrency Certification Consortium (C4)

  • Certified Bitcoin Professional – CBP

Courses

(Completed 5 in a row, 2016 October – eCPPT, November – eCRE, December – eWPTX, 2017 January – OSCP, March – OSWP)


ecptx_certificate_smewptx_certificate_sm


Made with 💖 in Sri Lanka 🇱🇰

29 thoughts on “☣ About

  1. Hi,could you please recommand some books about information security?I’m interested in this method but have no idea what to learn.Thanks!!

  2. I’m new students from ICT collage, n begin to study n intererst about PenTest, Forensic. Could you guide or give me some artikel or book.
    Thanks

  3. Hi,
    This blog is really impressive actually.
    The number of acknoledgments you have is too damn high… Congratz.

    If you can mail me the same things you mailed to the others before I would be thankful.

    I read your whitepaper about SQLi on insert/update/delete. It was really interesting but unfortunately most of the techniques seem to apply only on MySQL. Moreover, I think this is really straight forward and you should try to explain a little more what you do, and give some screenshot of what you obtain.
    For instance, the article about the linkedIn vulnerability was more comprehensible.

    Anyway, I think you should keep writing articles because you seem to have a talent in PenTest.

    Good luck for your studies.

  4. hai osanda ,

    i have been read your ebook about SQLi, very interesting but i have question in one part about SQLi especially at Insert statement. what’s type payload that we can add at insert statement ??
    for example i have web (vulnerable) for security test purpose. the form is only for insert statement for example “contact us”. it have 4 field and i set one field can be injected (no filtering character). now what we can do with this hole ?? if there’s is a page that display data from “contact us” then i can do more about SQli and lookup the result of injection , but the condition is not. there is no display page result for injection. may be you know ? need explain more , thank you 🙂

    • Hello mahendra,

      My name is Kavishka Gihan. I am not an expert in SQLi but I think I could give you some kind of an explanation that may help you.

      So first things first, if you ever find a SQLi vulnrability somewhere, most of the time it would be either a Blind SQLi or UNION based injection. Try injecting a SQLi statement with wrong syntax ( ?id=1 ‘ something-here ). If you can see an error showing up in the web page, that means you have direct SQLi but if doesn’t you may have to use blind SQLi techniques. If simply said, by making the web app sleep for 10 seconds.

      So your main question was what we could do with insert statements and what kind of payloads we can use with insert statements. With the insert statement you can insert values to a database. First you will have to check the permissions for the database you want to insert data to. (For that you can use information_schema database ). If you have write permissions you can move on.But in most modern websites insert permissions are disabled. Suppose that you have a login functionality in the website. In that case you can try to insert another user with a username and a password so that you can login to the login form (but also you can try to do SQLi in the login form too).

      [ INSERT INTO table_name (column1, column2, column3, …) VALUES (value1, value2, value3, …); ]

      That’s the kind of like the main thing we can do. And again there are many advanced exploitation techniques with SQLi. I just wanted you to know the basic injections we can do. Hope this was helpful

      If I have presented any wrong facts please let me know, because I am a learner too.You can always contact me.

      instagram — @_kavi.gihan

  5. i have been read your ebook about SQLi, very interesting but i have question in one part about SQLi especially at Insert statement. what’s type payload that we can add at insert statement ??
    for example i have web (vulnerable) for security test purpose. the form is only for insert statement for example “contact us”. it have 4 field and i set one field can be injected (no filtering character). now what we can do with this hole ?? if there’s is a page that display data from “contact us” then i can do more about SQli and lookup the result of injection , but the condition is not. there is no display page result for injection. may be you know ? need explain more , thank you 🙂

  6. Hello! I read your all posts and I was surprised because of your knowledge and your writing skils(Your posts are easy to understand. You are a good teacher to me! 🙂 ).
    I’ve been learned about XSS.
    I have a question about XSS. Would you like to response about my question?
    Could we bypass XSS filter even if we can’t use (it will remove in website), and encoding such as %lt or some unicode? (I got various fuzz date for XSS but I can’t find about this!)
    It is impossible to bypass ? 🙁
    Thank you for reading my comment. I will wait your re-comment!
    (I want to send e-mail to you but I couldn’t find it. So I left a reply here. Sorry! Probably this is not good with this category…)

    • Hello Sunari,

      Thanks for the feedback 🙂 Nothing is impossible 😉 yes you can depending on how the filter is coded by the developer 🙂

  7. Hello Osanda

    Can you send me your email , if you dont mind . I have an issue to discuss with you please

    BR

    Anuradha

  8. Hi Osanda

    I am looking for a person who can be engaged CREST certified Penetration tester for one of our application

    Pls kindly contact me – Thanuj 077377745

  9. Hi brother, I’m a C#, WPF, WCF developer and hope to enter the ethical hacking field. Let me know first of all where should I get my start. I have not an idea to follow some degree or course. I want to learn this alone. Please give me support!

  10. godak asai aiye hacking iganaganna
    ”””;;;;;;…patan ganna thanak kiyala denavada//

  11. Hello,

    Thank you for your blog, amazing resources for those who are starting in the cybersecurity path.
    Could you advise me, please?

    I am deciding three courses to do exam of certifications in three cybersecurity courses in elearnSecurity PTP v5 and OSCP.

    1.The other course would be between these other courses:
    masptv2 ihrpv1 mapv1 rep dfp

    2. how match OSCE to a course in elearnsecurity? probably PTX? If it is similar to any course like PTX, If I would have to choose my investment in one, which one would you recommend me?

    Thank you

  12. i’m interested in ‘CTF , Reverse_Engineering, Malware Analysis ‘… Can i get your email id to gain more real-time knowledge… please!

  13. Your BLOG is awesome,
    I like to start learning Reverse Engineering. Where can I start my learning process ?

Leave a Reply