top of page



Stop Hunting Bugs & Start Hunting Chains (Part 2: POC)
Now let’s move to the interesting part! Inspired by the Ni8mare Chain, we will see a four-stage exploit path inside a deliberately flawed Python platform CRAC. The chain combines: · Content-type confusion · Direct database disclosure · Weak cryptographic identity · Command injection Homepage Authentication Bypass (CVE-2026-21858) - Understanding the Vulnerability The Concept: - Server checks authentication in one way (cookies/headers) - Server pars

Om Mishra
Apr 85 min read


Smart Home Security Research - CVE-2025-14300 Assigned
The CRAC Learning team is back with another CVE as part of the Smart Home Security Research Program. An unauthenticated configuration issue in the connectAP API of the TP-Link Tapo C100 v5 IP camera. The bug allows a local attacker on the same network segment to submit unauthorized Wi-Fi reconfiguration requests to the device, forcing the camera to connect to an attacker-controlled network and causing service denial, stream loss, and a broader confidentiality impact. TP-Link

CRAC Learning
Apr 72 min read
CVE-2026-32169: Azure Cloud Shell Server-Side Request Forgery (SSRF) Vulnerability
CVSS: 10.0 (Critical) Software Affected: Microsoft Azure Cloud Shell Vulnerable Versions: Azure Cloud Shell service (specific versions not publicly listed; cloud service vulnerability) Fixed Versions: Vendor-side mitigation applied by Microsoft (service-level patching expected) Environments Impacted: Cloud environments using Azure Cloud Shell DevOps and cloud administration environments Enterprise Azure infrastructure management workflows Systems relying on browser-based c

CRAC Learning
Mar 272 min read
![Top CRITICAL CVEs [9th March to 15th March, 2026]](https://static.wixstatic.com/media/fff29d_b4bb12f49e7647a284f2fd8462080ed6~mv2.jpg/v1/fill/w_333,h_250,fp_0.50_0.50,q_30,blur_30,enc_avif,quality_auto/fff29d_b4bb12f49e7647a284f2fd8462080ed6~mv2.webp)
![Top CRITICAL CVEs [9th March to 15th March, 2026]](https://static.wixstatic.com/media/fff29d_b4bb12f49e7647a284f2fd8462080ed6~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_avif,quality_auto/fff29d_b4bb12f49e7647a284f2fd8462080ed6~mv2.webp)
Top CRITICAL CVEs [9th March to 15th March, 2026]
CVE-2026-28292 : simple-git Remote Code Execution Vulnerability CVSS: 9.8 Critical Affected Versions Software Affected: simple-git (Node.js Git wrapper library) Vulnerable Versions: simple-git 3.15.0 – 3.32.2 Fixed Versions: simple-git 3.32.3 or later Environments Impacted: Node.js applications using the simple-git library Backend services performing Git operations programmatically CI/CD automation tools using simple-git Cloud applications handling repository operations w

CRAC Learning
Mar 185 min read


Stop Hunting Bugs & Start Hunting Chains (based on Ni8mare)
This blog explores vulnerability chaining using an n8n Ni8mare -inspired attack path to demonstrate how seemingly harmless weaknesses can compound into something catastrophic. Let’s start with a hard truth. Most security programs are optimized for counting bugs not understanding compromise. We rank vulnerabilities by CVSS. We prioritize the red ones & close tickets. We feel productive but attackers don’t think in scores. They think in sequences. They don’t ask Is this bug cr

Om Mishra
Mar 64 min read


CRAC Insights — 9th Feb — 16th Feb
Stay ahead of the curve with the latest from the CRAC Insights Newsletter! From critical zero-days to major infrastructure breaches, here is your quick briefing on the cybersecurity landscape: TOP 3 CVES CVE-2026–21531: Microsoft Azure SDK Remote Code Execution CVSS: 9.8 (Critical) Affected Versions Microsoft Azure SDK components (vulnerable builds prior to the February 2026 security updates; organizations using unpatched SDK integrations are at risk). Description A critical

CRAC Learning
Feb 175 min read


Smart Home Security Research — CVE-2026–0918 Assigned
From having online meetings to getting real CVEs, the CRAC Learning team did it all! We discovered a Denial-of-Service vulnerability in the HTTP service of the TP-Link Tapo C100 v5 IP camera. Sending a POST request with an excessively large Content-Length header causes the main HTTP process to crash, freezing video and audio streams and forcing a restart. TP-Link acknowledged and published a fix; the issue was assigned CVE-2026–0918 and a High score (CVSS v4.0 7.1). Tapo came

Azim Javed
Feb 112 min read


Smart Security Research Diaries: Attacking the Internet of Things
Before reading this part, go over our previous blog - https://www.crac-learning.com/post/smart-security-research-diaries-defending-the-internet-of-things Then I started the Phase-1 of Smart Home Security Research Program by CRAC Learning with great enthusiasm & aspirations to find real vulnerabilities, not just solving TryHackMe labs. When I found that I'll be attacking the TP-Link Tapo C100 IP Camera, the first thing I did was Threat Modelling. I dived deep into gathering pa

Azim Javed
Feb 104 min read


Data Leaks: The Cyber Risk Most People Don’t Realize Is Already Affecting Them
When people hear the word cybersecurity , most assume it’s about big companies, hackers in dark rooms, or banks losing crores. The common reaction is simple: “This doesn’t concern me. I’m just a normal person.” That belief is exactly why data leaks are one of the most dangerous cyber risks today . Not because they are complex.Not because they are rare.But because most people don’t even realize they are victims . The Biggest Misunderstanding: “Data Leaks Affect Companies, No

Om Mishra
Feb 94 min read


Smart Security Research Diaries: Defending the Internet of Things.
18th of January, 2026 - The day started with some network troubleshooting and system administration as we forgot to bring our wi-fi router that was earlier acting as a gateway. But yeah, after scratching our heads we were finally able to use one of our laptops as the gateway which really helped us capture all the data frames via Wireshark. Today, our main goal was to get Remote Code Execution on our target. Last time we found a Buffer-Overlfow based Denial-of-Service vulnera

Azim Javed
Jan 253 min read


AI Cyberattacks in India: The New-Age Hackers We’re Not Ready For
AI Cyberattacks in India: The New-Age Hackers We’re Not Ready For

Om Mishra
Dec 15, 202511 min read


Hack-to-Trade: A Concern for executives
In the past, few Hackers gained access to insider information that netted him millions of dollars. UK national Robert B. Westbrook successfully compromised a CFO's outlook account and added an auto-forward rule in mailbox to redirect all the emails to a disposable temporary email address. Hiding traces under multiple layers of VPN channel, transacting through untraceable accounts, bitcoin transactions but still couldn't escape the investigating agencies. Westbrook's scheme ne

CRAC Learning
Dec 7, 20252 min read


Maritime History Rewritten: First Vessels Delivered with Cybersecurity Notations
Cyber-Resilient Ship In an era where ships are as connected as cities, the sea is no longer a sanctuary from cyber threats. Vard which is...

CRAC Learning
Jun 4, 20252 min read


Everest Group - What Happens When Your HR System Becomes Your Weakest Link?
Everest Group , is an old name in cyber extortion and now it is rewriting the rulebook for modern cybercrime. It has come into spotlight...

CRAC Learning
Jun 2, 20252 min read


The Ethics of Hacking Back: Defense or Revenge?
In an age where cyberattacks are becoming more complex and widespread, governments and organizations are constantly faced with the choice...

CRAC Learning
Apr 23, 20252 min read


Decoding the Latest Government Cybersecurity Policies
Technology has become an integral part of our lives and the importance of cybersecurity in today's day and age cannot be overemphasized....
Bhavgun Kaur
Mar 31, 20256 min read


AI's Role in Early Detection of Cyber Threats: The Frontier of Cybersecurity
In today's digital world, cybersecurity is crucial. As cyber threats become increasingly sophisticated, traditional defenses are no...
Asis Kaur
Mar 25, 20255 min read


Securing your Instagram account
Recently there have been multiple scenarios leading Instagram account compromise of users especially, targeting the influencers. With a...

CRAC Learning
Feb 20, 20252 min read


A Deep Dive into Phishing URL Detection
In today's digital age, cyber security is more critical than ever. One of the most prevalent threats is phishing , where attackers...

CRAC Learning
Jan 11, 20254 min read
Internship Experience — Cybersecurity with AI
Let’s hear from our Cybersecurity with AI Research intern — Dinki Gupta about their Summer internship 2024 experience. I’m Dinki Gupta, a...

CRAC Learning
Dec 22, 20243 min read
bottom of page





