<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Sane</title>
    <description>The latest articles on DEV Community by Sane (@sane08).</description>
    <link>https://dev.to/sane08</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2213673%2F47e30747-7796-4dd7-a5fa-9e3ca8d0cc99.jpg</url>
      <title>DEV Community: Sane</title>
      <link>https://dev.to/sane08</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sane08"/>
    <language>en</language>
    <item>
      <title>How to Live After 1 AM</title>
      <dc:creator>Sane</dc:creator>
      <pubDate>Thu, 16 Apr 2026 08:05:50 +0000</pubDate>
      <link>https://dev.to/sane08/how-to-live-after-1-am-17lm</link>
      <guid>https://dev.to/sane08/how-to-live-after-1-am-17lm</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;We Become What We Are At 1AM.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;At that sleepy hour, our mind and heart start pressuring us - "What have I done till now? Why me? Why not me? What if?"&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw9sd3h5chyelhfmfiz7h.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw9sd3h5chyelhfmfiz7h.jpg" alt=" " width="800" height="534"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We start *&lt;em&gt;REAL *&lt;/em&gt; thinking at night. Everyone is sleeping. A phone in hand, scrolling through reels and shorts, earphones in ears - and still, somehow, we hear our own inner voice.&lt;/p&gt;

&lt;p&gt;We regret. We regret wasting time. We regret watching a reel where someone our age, or younger, is earning more or living happier.&lt;/p&gt;

&lt;p&gt;But the truth is - &lt;strong&gt;it's not regret. It's feeling&lt;/strong&gt;. We feel a lot.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Unfinished Things
&lt;/h2&gt;

&lt;p&gt;I never finish anything - not a course, not a book, not a project. I'm impatient. I have a thousand interests to start but never enough courage to finish.&lt;/p&gt;

&lt;p&gt;Everyone starts a race at the same point and the same time. But only the ones who finish are winners.&lt;/p&gt;

&lt;p&gt;I couldn't finish anything. And every night, I felt it.&lt;/p&gt;

&lt;p&gt;I watched movies thinking they'd inspire me. Nothing happened. I couldn't complete books. Not even articles.&lt;/p&gt;

&lt;p&gt;So the question became - &lt;strong&gt;how do you live with that?&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Then HOW TO LIVE:-
&lt;/h2&gt;

&lt;p&gt;Simple Steps. But Hard to Follow..&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;After dinner, open any notebook and write down - &lt;em&gt;"What is my plan for the next 2 hours?"&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Be honest. If you want to watch reels, write it. If you want to watch a movie, write that too. Whatever you want to do - write it down.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;You already know yourself. Based on what you did yesterday and the day before, you know what you'll do next.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;After writing, take a photo of that page and save it.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Now the hard part - &lt;em&gt;finish what you wrote, but in half the time.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you wrote "2 hours of reels," set an alarm for 1 hour. Scroll and finish. If it's a movie, pause or skip - complete it within 1 hour.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;You just saved an hour. Now what?&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;You've completed your free time. Now move. Open something you've been ignoring.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Don't study it. Don't force it. Just look at it for 10 minutes. The magic you're looking for - &lt;em&gt;it lives in the things you've been ignoring.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;After 10 minutes, move on. Or if you want more time-pass, follow the same steps again. Write it. Half the time.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  WHAT I DID :-
&lt;/h2&gt;

&lt;p&gt;One night I did exactly this.&lt;/p&gt;

&lt;p&gt;At 10 PM after dinner, I wrote - "By 12 AM I want to finish an anime episode and scroll reels."&lt;/p&gt;

&lt;p&gt;By 11 PM, I was already done with both. And I was bored.I kept on looking timer…&lt;/p&gt;

&lt;p&gt;So I opened a tool I had been ignoring for weeks - a security research project. I started exploring. Found a few ideas. Tried them. Tried again.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;After 7 days, I made money.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;And when it happened - I felt nothing dramatic. No fireworks.&lt;/p&gt;

&lt;p&gt;Because I had stopped thinking "I wasted so much time." I started thinking - &lt;strong&gt;"I used the time I had."&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;That one shift changed everything.&lt;/p&gt;

&lt;h2&gt;
  
  
  One Last Thing
&lt;/h2&gt;

&lt;p&gt;Heartbreaks, ignorance, the people who dismissed you - those feelings don't go away. But they're not here to break you. They're here to move you.&lt;/p&gt;

&lt;p&gt;Cheap thinking comes from cheap people. Your value was never theirs to decide. You decide how valuable you are.&lt;/p&gt;

&lt;p&gt;If you read this till the end - try it tonight. If you didn't - I hope you're busy living your life.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;All the best.&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>writing</category>
      <category>career</category>
      <category>learning</category>
    </item>
    <item>
      <title>VULNERABILITY RESEARCH</title>
      <dc:creator>Sane</dc:creator>
      <pubDate>Sat, 19 Oct 2024 05:47:06 +0000</pubDate>
      <link>https://dev.to/sane08/vulnerability-research-57ej</link>
      <guid>https://dev.to/sane08/vulnerability-research-57ej</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;Vulnerabilities 101&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Vulnerability *&lt;em&gt;:A vulnerability is defined as a weakness or flow in the design or behaviors of a system or application.&lt;br&gt;
**Exploit *&lt;/em&gt;: It’s an action that utilizes a vulnerability on a system or application.&lt;br&gt;
**Proof of Concept (PoC)&lt;/strong&gt; : A technique or tool that can show exploitation of a vulnerability. Like proof of attack.&lt;br&gt;
Foothold is referred as an access to the vulnerable machine’s console.&lt;/p&gt;

&lt;h2&gt;
  
  
  Vulnerability is Hero
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;So, an attacker can use these vulnerabilities and gain unauthorized access to systems or applications then he can do whatever he wants.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There are mainly 5 categories of vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;*&lt;em&gt;Operating System *&lt;/em&gt;: These types of vulnerabilities are found within the Operating Systems results in Privilege Escalation.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;(Mis)Configuration-Based&lt;/strong&gt; : so, vulnerabilities can be occurred from incorrect or wrong configured application or service. Like a shopping website allowing attacker to change price of products.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Weak or Default Credentials&lt;/strong&gt; : As we know few people use weak passwords like ‘123456789’, ‘password!’, ‘admin:admin’ .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Application Logic&lt;/strong&gt; : These vulnerabilities are occurring due to poorly designed applications. Like a user can access other users orders or profile by changing id number.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;*&lt;em&gt;Human-Factor *&lt;/em&gt;: so, different attacker have different techniques few use emails sends as company name and access users data, few uses or share links via sms to get otps lot more…&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Scoring Vulnerabilities (CVSS &amp;amp; VPR)
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;We need to know how much impact of vulnerability cause to company or application.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;So, we need to measure it vulnerability by giving it rating or impact.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;This rating can be used to pay bug bounty hunter.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;For Example, Low priced T-Shirt might have poor design or quality but Medium Rated have slightly better or High rated or prices T-Shirt can be branded and best.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;So, based on price or rating we get a impact of it.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Common Vulnerability Scoring System (CVSS)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;CVSS is a popular framework for scoring vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Rating and Scores&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;None : 0&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Low : 0.1–3.9&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Medium : 4.0–6.9&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;High :7.0–8.9&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Critical : 9.0 -10.0&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Vulnerability Priority Rating (VPR)
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;VPR is modern framework to score vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Its risk driven rating it won’t consider impact of vulnerabilities like CVSS.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Rating and Scores&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Low : 0.0–3.9&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Medium : 4.0 -6.9&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;High : 7.0–8.9&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Critical : 9.0–10.0&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Vulnerability Databases
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The database which contains information about Vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Vulnerabilities are classified under “ Common Vulnerability and Exposures” (CVE).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;This CVEs have a format like CVE-YEAR-IDNUMBER like in 2017 a vulnerability found we declare it as CVE-2017–0144.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;*&lt;em&gt;National Vulnerability Database&lt;br&gt;
*&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;It’s a website that lists all publicly available CVEs.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Exploit-DB&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;It’s best resource we get all information as well as PoCs about vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Exploit Vulnerabilities
&lt;/h2&gt;

&lt;p&gt;*&lt;em&gt;Automated Vulnerability Scanner&lt;br&gt;
*&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Nessus Scanner we use to find vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Broken Access Control : attacker can access other parts of applications.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Insecure Deserialization : malicious code or data that can be passed on application.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Injection : input malicious data into application.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;*&lt;em&gt;Manual Exploits&lt;br&gt;
*&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;**Rapid7 **resource we use to search and filter out type of vulnerability. It contains instructions for exploiting using Metasploit.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;**GitHub **also best resource to look for exploits.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;**Searchsploit **is a tool can be used to search exploits with instructions. It has default in Kali and no need internet for it.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;*&lt;em&gt;NOTES :&lt;br&gt;
*&lt;/em&gt;&lt;br&gt;
1 . Not all exploits shown in first search works.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Always need to look for more even first one works cause the more we dig we get more information of it.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Finding attacking website information such as version number or more can be hard to find but we need to try out like checking on source code and java script files.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Best to check backend of site with help of few tools like wappalyzer like those can help.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;training from &lt;em&gt;tryhackme&lt;/em&gt;.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
