Pulkit MitalTransport Layer Security (TLS)Transport Layer Security (TLS) is a security protocol that helps in the establishment of secure and encrypted communication between two…Oct 20, 2023Oct 20, 2023
Pulkit MitalWalkthrough: Shocker[HTB]Target Machine Information: — Host Name: Shocker — IP Address: 10.129.90.38 — OS: LinuxFeb 2, 2021Feb 2, 2021
Pulkit MitalOWASP Top 10- Web ApplicationOWASP Top 10 is the best reference guide for web application testing. Based on a large number of data sets, it ranks the ten most severe…Jul 28, 2020Jul 28, 2020
Pulkit MitalPhases of Ethical HackingThe process of Ethical Hacking can be classified into five phases which are mentioned below:May 16, 2020May 16, 2020
Pulkit MitalGuide To Pentesting- Nmap BasicsEver Wonder how the hackers or cybersecurity professional gets to know more about our system. In this article, we will cover the same…Apr 8, 20201Apr 8, 20201
Pulkit MitalWalkthrough: LAME [HTB]Target Machine Information: — Host Name: Lame — IP Address: 10.10.10.3 — OS: LinuxFeb 1, 2020Feb 1, 2020
Pulkit MitalDark Patterns DangersThese patterns are the things that are used in various website and mobile applications to deceive the user into purchasing or sharing…Jul 20, 2019Jul 20, 2019
Pulkit MitalParts of the World Wide WebDo you know that in today’s world when we access the internet or world wide web, we are only scratching the surface of it?Apr 17, 2019Apr 17, 2019