Pulkit MitalTransport Layer Security (TLS)Transport Layer Security (TLS) is a security protocol that helps in the establishment of secure and encrypted communication between two…5 min read·Oct 20, 2023----
Pulkit MitalWalkthrough: Shocker[HTB]Target Machine Information: — Host Name: Shocker — IP Address: 10.129.90.38 — OS: Linux4 min read·Feb 2, 2021----
Pulkit MitalOWASP Top 10- Web ApplicationOWASP Top 10 is the best reference guide for web application testing. Based on a large number of data sets, it ranks the ten most severe…12 min read·Jul 28, 2020----
Pulkit MitalPhases of Ethical HackingThe process of Ethical Hacking can be classified into five phases which are mentioned below:4 min read·May 16, 2020----
Pulkit MitalGuide To Pentesting- Nmap BasicsEver Wonder how the hackers or cybersecurity professional gets to know more about our system. In this article, we will cover the same…6 min read·Apr 8, 2020--1--1
Pulkit MitalWalkthrough: LAME [HTB]Target Machine Information: — Host Name: Lame — IP Address: 10.10.10.3 — OS: Linux4 min read·Feb 1, 2020----
Pulkit MitalDark Patterns DangersThese patterns are the things that are used in various website and mobile applications to deceive the user into purchasing or sharing…5 min read·Jul 20, 2019----
Pulkit MitalParts of the World Wide WebDo you know that in today’s world when we access the internet or world wide web, we are only scratching the surface of it?4 min read·Apr 17, 2019----