Meet Samir Deshar 👋

Profile
If you are here you already know me..Let’s learn together.

CHEETSHEET

List of essential commands while doing rooms and labs in hackthebox and tryhackme. Or who know you may be h……

June 15, 2025 Â· 3 min Â· Samir Deshar

Curl Cheatesheet

Different ways on how the curl can be used.

December 20, 2024 Â· 3 min Â· Samir Deshar

Learning Kerberos

What is kerberos and how is it used in SSO

December 4, 2024 Â· 3 min Â· Samir Deshar

Understanding DNS : How the Internet Knows Where to Go

Learn about how the internet knows where to go and how it does it.

November 19, 2024 Â· 4 min Â· Samir Deshar

Working of half proxy

WHat is half proxy and how it works

November 10, 2024 Â· 3 min Â· Samir Deshar

OAuth is a method for authorization that allows access to third-party applications or services without requiring the sharing of usernames and passwords. How OAuth 2.0 Works? OAuth 2.0 is an authorization protocol designed to provide secure delegated access to resources without exposing user credentials to third-party applications. Key Components: Resource Owner: The user who owns the data or resource. Client: The application requesting access to the user’s resource on behalf of the user (e.g., a web or mobile app). Resource Server: The server hosting the protected resources (e.g., an API). Authorization Server: The server that authenticates the user and issues access tokens. This may be the same as the Resource Server. OAuth Flows (Grant Types): OAuth 2.0 offers different authorization flows based on the type of application and security requirements. ...

5 min Â· Samir Deshar