{"id":46,"date":"2025-02-09T10:02:55","date_gmt":"2025-02-09T10:02:55","guid":{"rendered":"http:\/\/13.215.97.94\/?page_id=46"},"modified":"2026-03-16T08:31:37","modified_gmt":"2026-03-16T08:31:37","slug":"write-ups","status":"publish","type":"page","link":"https:\/\/jasveermaan.com\/index.php\/write-ups\/","title":{"rendered":"Write Ups"},"content":{"rendered":"\n<p>Unfortunately, the previous virtual private server (VPS) crashed due to technical issues, and the author did not have a full backup of the write-up. Some parts can be found on the Wayback Machine. Below is a new write-up, and in the coming days, I will make more effort to write additional ones.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2025\/02\/12\/exploiting-android-exported-activities-for-root-bypass\/\">Intentional Exposure: Exploiting Android Exported Activities for Root Detection Bypass<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2025\/04\/04\/android_pnb_malware\/\" data-type=\"link\" data-id=\"https:\/\/jasveermaan.com\/index.php\/2025\/04\/04\/androudpnbmalware\/\">Android Banking Malware Analysis<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2025\/11\/29\/how-i-used-tailscale-to-access-my-homelab-from-anywhere\/\" data-type=\"post\" data-id=\"102\">How I Used Tailscale to Access My Homelab from Anywhere<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2025\/11\/29\/ai-driven-ad-enumeration\/\" data-type=\"link\" data-id=\"https:\/\/jasveermaan.com\/index.php\/2025\/11\/29\/ai-driven-ad-enumeration\/\">AI-driven AD enumeration<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2025\/12\/02\/exploring-spicyad\/\" data-type=\"post\" data-id=\"143\">Exploring SpicyAD for Active Directory Security Testing<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2025\/12\/11\/using-proxychains-with-mythic-c2\/\" data-type=\"link\" data-id=\"https:\/\/jasveermaan.com\/index.php\/2025\/12\/11\/using-proxychains-with-mythic-c2\/\">Using Proxychains With Mythic C2 to Pivot From Kali \u2192 C2 \u2192 Assume Breach \u2192 Internal Network<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2025\/12\/18\/exfiltrating-data-via-dns\/\" data-type=\"link\" data-id=\"https:\/\/jasveermaan.com\/index.php\/2025\/12\/18\/exfiltrating-data-via-dns\/\">Exfiltrating Data via DNS in a Restricted Environment<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2025\/12\/29\/child-to-parent-domain-escalation-lessons-learned-from-kerberos-etype-pitfalls\/\" data-type=\"link\" data-id=\"https:\/\/jasveermaan.com\/index.php\/2025\/12\/29\/child-to-parent-domain-escalation-lessons-learned-from-kerberos-etype-pitfalls\/\">Child-to-Parent Domain Escalation: Lessons Learned from Kerberos ETYPE Pitfalls<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2026\/01\/06\/usingburpsuiteprowithoutinstallingonclientvdi\/\" data-type=\"link\" data-id=\"https:\/\/jasveermaan.com\/index.php\/2026\/01\/06\/usingburpsuiteprowithoutinstallingonclientvdi\/\">Using Burp Suite Professional Without Installing It on a Client VDI (via SSH &amp; EC2)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2026\/01\/16\/llm-assisted-source-code-review-using-falconeye\/\">LLM Assisted Source Code Review Using FalconEye<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2026\/01\/26\/fixing-illegal-server-name-error-in-burp-suite-caused-by-underscores-in-domain-names\/\" data-type=\"link\" data-id=\"https:\/\/jasveermaan.com\/index.php\/2026\/01\/26\/fixing-illegal-server-name-error-in-burp-suite-caused-by-underscores-in-domain-names\/\">Fixing \u201cIllegal Server Name\u201d Error in Burp Suite Caused by Underscores in Domain Names<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/jasveermaan.com\/index.php\/2026\/03\/16\/exploiting-react-server-components-rce-react2shell-cve-2025-55182\/\" data-type=\"link\" data-id=\"https:\/\/jasveermaan.com\/index.php\/2026\/03\/16\/exploiting-react-server-components-rce-react2shell-cve-2025-55182\/\">Exploiting React Server Components RCE (React2Shell \u2013 CVE-2025-55182)<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unfortunately, the previous virtual private server (VPS) crashed due to technical issues, and the author did not have a full backup of the write-up. Some parts can be found on the Wayback Machine. Below is a new write-up, and in the coming days, I will make more effort to write additional ones.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-46","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/jasveermaan.com\/index.php\/wp-json\/wp\/v2\/pages\/46","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasveermaan.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jasveermaan.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jasveermaan.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasveermaan.com\/index.php\/wp-json\/wp\/v2\/comments?post=46"}],"version-history":[{"count":14,"href":"https:\/\/jasveermaan.com\/index.php\/wp-json\/wp\/v2\/pages\/46\/revisions"}],"predecessor-version":[{"id":268,"href":"https:\/\/jasveermaan.com\/index.php\/wp-json\/wp\/v2\/pages\/46\/revisions\/268"}],"wp:attachment":[{"href":"https:\/\/jasveermaan.com\/index.php\/wp-json\/wp\/v2\/media?parent=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}