Blog
Cyber security is a dynamic field that is always evolving. Keep up with the latest news, vulnerabilities, threats, and new research by following me on Twitter.
Posts
A penetration test is a deliberate attack on a software or hardware system with the goal of exposing security ...
The term "social engineering" refers to a wide range of malevolent behaviours carried out through human ...
In the world of cyber security, various methods and tests are conducted to ensure the security barrier of a ...
Whether you run an online business or an offline store, your business needs to be secure. You might be surprised, ...
In the 21st century, data and network security have become a severe concern for various businesses. In reality, it ...
The internet has made calling and texting so much easier that almost every of us uses it in our daily lives. Do ...
Mac address! What is the mac address' meaning? And what can you do with a mac address? This is what we are ...
Are you the one who wants to avail a software development job? Or you are a recruiter looking forward to test a ...
Write-ups
The use of social media is increasing day by day. Social media provide us with lots of stuff for entertainment, ...
Intro
The Kenobi box will cover the following topics:
Enumeration of samba shares
Manipulation of a vulnerable ...
Intro
Skynet machine covers the following topics:
Vulnerable smb server
Squirrelmail brute-forcing with ...
Intro
We'll exploit a common misconfiguration on a widely used automation server (Jenkins) and gain access through ...
Intro
This machine will cover brute-forcing account credentials & handling public exploits. Here's a link to ...
Intro
This write-up will cover manually exploiting an SQLi vulnerability without the use of SQLMap, cracking users ...
Intro
Hello there and welcome to my first ever write-up.
Recently I've been spending a lot of time on TryHackMe; ...