Blog | Hidden Investigations - Top Cybersecurity Team from Bangladesh
  • Home
  • Blog
  • Our Team
  • About Us
  • Contact
  • Join Us
Sakibul Ali Khan

Sakibul Ali Khan (4 Posts)

File Upload Bypass: Understanding and Mitigating Risks in Web Applications

August 31, 2025 Sakibul Ali Khan
Application Security File Upload Vulnerability Remote Code Execution (RCE) Web Application Security
File Upload Bypass: Understanding and Mitigating Risks in Web Applications

Introduction File upload vulnerabilities are a significant concern in the realm of web application security. When a web application allows users to upload files without…

Read more →

How to Find Hidden Messages in JPEGs: A Beginner’s Guide to CTF Steganography Challenges from KUET’s Cyber Security Seminar

August 22, 2025 Sakibul Ali Khan
Cybersecurity Digital Forensic Image Forensic Stegnography
How to Find Hidden Messages in JPEGs: A Beginner’s Guide to CTF Steganography Challenges from KUET’s Cyber Security Seminar

On August 21, 2025, the KUET Cyber Security Club (KCSC) officially launched with a thrilling seminar in collaboration with SGIPC (KUET’s Programming Club) and Hidden Investigations. This event was not just…

Read more →

Unearthing Secrets in Memory — A Full Write-Up of “Now You See Me” (Shakti CTF 2025)

August 2, 2025 Sakibul Ali Khan
Android Reversing Android Security CTF Reverse Engineering
Unearthing Secrets in Memory — A Full Write-Up of “Now You See Me” (Shakti CTF 2025)

Reverse-engineering a native library is one of the most common (and most fun) ways to hide a flag in a CTF. In the Now You See…

Read more →

Docker Zero to Hero For Hackers: A Practical Guide for Cybersecurity Enthusiasts

July 26, 2025 Sakibul Ali Khan
Cloud Security Cybersecurity Devsecops Docker Pentesting
Docker Zero to Hero For Hackers: A Practical Guide for Cybersecurity Enthusiasts

Docker is an open-source platform designed to empower developers by facilitating the building, shipping, and running of applications within containers. As a lightweight and portable…

Read more →

© 2022-2025 Hidden Investigations — Tailored by security researchers.