Open in app

Sign in

Write

Sign in

Pulkit Mital
Pulkit Mital

51 Followers

Home

About

Oct 20

Transport Layer Security (TLS)

Transport Layer Security (TLS) is a security protocol that helps in the establishment of secure and encrypted communication between two hosts, for example, between a client and a server. When a client needs to establish a secure connection with the server, it will perform a TLS handshake to establish communication…

Tls Handshake

5 min read

Transport Layer Security (TLS)
Transport Layer Security (TLS)
Tls Handshake

5 min read


Feb 2, 2021

Walkthrough: Shocker[HTB]

Target Machine Information: — Host Name: Shocker — IP Address: 10.129.90.38 — OS: Linux Overview In this walk through, I will be showing how to follow a step by step methodology to own a user and root without Metasploit. Step1 — In the first step we will use Nmap to…

Cybersecurity

4 min read

Walkthrough: Shocker[HTB]
Walkthrough: Shocker[HTB]
Cybersecurity

4 min read


Jul 28, 2020

OWASP Top 10- Web Application

OWASP Top 10 is the best reference guide for web application testing. Based on a large number of data sets, it ranks the ten most severe security weaknesses in web applications. In this article, I will give a simple overview of all the top 10 vulnerabilities and how to mitigate…

Security

12 min read

OWASP Top 10- Web Application
OWASP Top 10- Web Application
Security

12 min read


May 16, 2020

Phases of Ethical Hacking

The process of Ethical Hacking can be classified into five phases which are mentioned below: Reconnaissance (Information Gathering) Scanning Gaining Access Maintaining Access Covering Tracks Let’s go to each step and see how these phases are executed when a hacker or pentester wants to hack a target.

Ethical Hacking

4 min read

Phases of Ethical Hacking
Phases of Ethical Hacking
Ethical Hacking

4 min read


Apr 8, 2020

Guide To Pentesting- Nmap Basics

Ever Wonder how the hackers or cybersecurity professional gets to know more about our system. In this article, we will cover the same techniques from basics to advance. Let’s start with some theory. What is Nmap? Nmap is a network scanning and host detection tool which helps us to gather open ports and…

Nmap

6 min read

Guide To Pentesting- Nmap Basics
Guide To Pentesting- Nmap Basics
Nmap

6 min read


Feb 1, 2020

Walkthrough: LAME [HTB]

Target Machine Information: — Host Name: Lame — IP Address: 10.10.10.3 — OS: Linux Overview In this walkthrough, I will be showing how to follow a step by step methodology to own a user and root with Metasploit. Step-1: In the first step we will use Nmap to scan the…

Cybersecurity

4 min read

Walkthrough: LAME [HTB]
Walkthrough: LAME [HTB]
Cybersecurity

4 min read


Jul 20, 2019

Dark Patterns Dangers

These patterns are the things that are used in various website and mobile applications to deceive the user into purchasing or sharing critical information about them to the company without any intimation. Because of these patterns, people are losing their right to choose. What is Dark Pattern? Henry Brignull, one of…

UX

5 min read

Dark Patterns Dangers
Dark Patterns Dangers
UX

5 min read


Apr 17, 2019

Parts of the World Wide Web

Do you know that in today’s world when we access the internet or world wide web, we are only scratching the surface of it? Yes, It is true. In this modern world, we can compare the World Wide Web to an iceberg, where its tip is the 4% of the…

Technology

4 min read

Parts of the World Wide Web
Parts of the World Wide Web
Technology

4 min read

Pulkit Mital

Pulkit Mital

51 Followers
Following
  • Shivang Gupta

    Shivang Gupta

  • Shilpa Bansal

    Shilpa Bansal

  • Raveesh Taneja

    Raveesh Taneja

  • prachi agrawal

    prachi agrawal

  • Mukesh Bishnoi

    Mukesh Bishnoi

See all (51)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams