Hey,This is

Ifrah Iman

Penetration Tester Bug Bounty Hunter Ethical Hacker

About me

A little intro


I'mIfrah Iman

Penetration Tester & Bug Bounty Participant

Computer Science Student from Pakistan. What I believe is no system is safe, thats why I love to research about Infosec. I do Penetration Testing & I participate in Bug Bounty Hunting @ Various Platforms, Hackerone, Bugcrowd, Bountyfactory ETC


I can offer

Web App Pentest

Penetrating your web app & finding vulnerabilities which could be exploitable.

Network Pentest

Pentesting your network & finding flaws by practicing attacks.

Mobile App Pentest

Providing Android application penetration testing for checking the flaws.

Blog Posts

Read my latest posts

Easter Egg | Mr Robot Season 3 Episode 2

Today I'll be sharing with you a little easter egg i found in the Show , Mr Robot.

This easter egg just came as a small snippet from Season 3, Episode 2.

If you've watched this episode you know that in the ending, FBI gets the Email which Elliot sends to Darlene. FBI Officer assuming this email may contain some evidence about Tyrell, opens it up & Clicks on the Link which is on the email.
You can see the URL right? FBI officer clicked on this URL.

Now the Easter Egg is hidden here ;) Lets click this URL and see where it takes us to.

a webpage with a base64 encoded code :) lets decode it. 

Now as you can, after decoding the base64, it doesnt really shows up a text or a code. But remember? The URL ended up with "Plans.rar", so this might be a RAR compressed file which was encoded into base64.

Allright lets copy this decoded code and paste it into a text editor and then save it as "Plans.rar"

We got a working RAR file :)

Now lets extract it's contents.

You will get a Image file. which has a QR code
Something like:

You would need to scan it, I am using an online QR code scanner.
So finally in the end. You'll get in the raw format:

Open it & You'll get to know, it contains the exploit of a Dell monitor, Which maybe in the Show Darlene used it in Elliots computer, if you remember. That Exploit gave the FBI access to Elliots Monitor, even though he detected the rootkit, but still they had access to the Monitor.

I love the show Mr Robot, because not only they show the real face of society but technically they show us everything possible which could happen. Real hacks, exploits, situations. Not only this, but there are a lot other easter eggs which are hidden in every detail of that show.

Is a presentation piece of either Defcon Conference or some exploit of NSA.

I hope you enjoyed.

Changing Login Background of Gnome

Most of the Debian Gnome distributions have a blank or solid colored login panel background. Now there's no option in the Tweak Tool or Settings to change, so you need to do it manually by modifying the gnome-shell.css & other files.

GSTRES=$(basename $GST)

mkdir -p $WORKDIR
mkdir theme

for r in `gresource list $GST`; do
  gresource extract $GST $r >$WORKDIR$(echo $r | sed -e 's/^\/org\/gnome\/shell\//\//g')

cd theme
cp "$IMAGE" ./

echo "
#lockDialogGroup {
  background: #2e3436 url(resource:///org/gnome/shell/theme/$(basename $IMAGE));
  background-size: cover;
  background-repeat: no-repeat;
}" >>gnome-shell.css

echo '<?xml version="1.0" encoding="UTF-8"?>
  <gresource prefix="/org/gnome/shell/theme">' >"${GSTRES}.xml"
for r in `ls *.*`; do
  echo "    <file>$r</file>" >>"${GSTRES}.xml"
echo '  </gresource>
</gresources>' >>"${GSTRES}.xml"

glib-compile-resources "${GSTRES}.xml"

sudo mv "/usr/share/gnome-shell/$GSTRES" "/usr/share/gnome-shell/${GSTRES}.backup"
sudo mv "$GSTRES" /usr/share/gnome-shell/

rm -r $WORKDIR

if [ "$CREATED_TMP" = "1" ]; then
  rm -r ~/tmp
Save it as "login-background.sh" && Put this code on /home/ or /root/ .

Choose any jpeg image background you want and move it to the same directory.

Open up terminal & type:

IMAGE=~/Image.jpg sh login-background.sh

Now type this command:

service gdm restart
Or restart your system. You'll see the Login Background has been changed.