Oct 20Transport Layer Security (TLS)Transport Layer Security (TLS) is a security protocol that helps in the establishment of secure and encrypted communication between two hosts, for example, between a client and a server. When a client needs to establish a secure connection with the server, it will perform a TLS handshake to establish communication…Tls Handshake5 min readTls Handshake5 min read
Feb 2, 2021Walkthrough: Shocker[HTB]Target Machine Information: — Host Name: Shocker — IP Address: 10.129.90.38 — OS: Linux Overview In this walk through, I will be showing how to follow a step by step methodology to own a user and root without Metasploit. Step1 — In the first step we will use Nmap to…Cybersecurity4 min readCybersecurity4 min read
Jul 28, 2020OWASP Top 10- Web ApplicationOWASP Top 10 is the best reference guide for web application testing. Based on a large number of data sets, it ranks the ten most severe security weaknesses in web applications. In this article, I will give a simple overview of all the top 10 vulnerabilities and how to mitigate…Security12 min readSecurity12 min read
May 16, 2020Phases of Ethical HackingThe process of Ethical Hacking can be classified into five phases which are mentioned below: Reconnaissance (Information Gathering) Scanning Gaining Access Maintaining Access Covering Tracks Let’s go to each step and see how these phases are executed when a hacker or pentester wants to hack a target.Ethical Hacking4 min readEthical Hacking4 min read
Apr 8, 2020Guide To Pentesting- Nmap BasicsEver Wonder how the hackers or cybersecurity professional gets to know more about our system. In this article, we will cover the same techniques from basics to advance. Let’s start with some theory. What is Nmap? Nmap is a network scanning and host detection tool which helps us to gather open ports and…Nmap6 min readNmap6 min read
Feb 1, 2020Walkthrough: LAME [HTB]Target Machine Information: — Host Name: Lame — IP Address: 10.10.10.3 — OS: Linux Overview In this walkthrough, I will be showing how to follow a step by step methodology to own a user and root with Metasploit. Step-1: In the first step we will use Nmap to scan the…Cybersecurity4 min readCybersecurity4 min read
Jul 20, 2019Dark Patterns DangersThese patterns are the things that are used in various website and mobile applications to deceive the user into purchasing or sharing critical information about them to the company without any intimation. Because of these patterns, people are losing their right to choose. What is Dark Pattern? Henry Brignull, one of…UX5 min readUX5 min read
Apr 17, 2019Parts of the World Wide WebDo you know that in today’s world when we access the internet or world wide web, we are only scratching the surface of it? Yes, It is true. In this modern world, we can compare the World Wide Web to an iceberg, where its tip is the 4% of the…Technology4 min readTechnology4 min read