Home
Prakash Kumar
Cancel

Automating Workflows with /dev(?:sec)?ops/i

DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). It aims to shorten the systems development life cycle and provide continuous delivery with high soft...

WIFI Security 4 - Pivoting

Your Red Team has been tasked by Xcorp to conduct a security assessment of their headquarters. Your specific responsibility is to evaluate the security of their WiFi network, which could provide ac...

Reverse Engineering 2

Debugging Running Process GDB has capability to attach to the running process and debug it. From the perspective of malware analysis, attaching GDB (or a similar debugger) to a running process ca...

Reverse Engineering 1

GDB (GNU Debugger) Debugging tool for programs written in languages like Ada, C, C++, Objective C and Golang Analyze the behavior of a program at runtime, inspect variables, control program exe...

Linux Privilege Escalation 1

Linux Privilege Escalation During an engagement, if we got the access for the low privilege user in the linux environment then it might be necessay to escalate our privilege to other user it mig...

WIFI Security 3 - Honeypot

WEP honeypot Its type of decoy wireless network designed to attract and detect malicious activities, typically targeting attackers who exploit weak security protocols. Since the WEP is an vulner...

WIFI Security 2 - Reconnaissance

Reconnaissance Wi-Fi reconnaissance is the process of identifying and exploiting wireless networks. Using reconnaissance we can identify the unauthorized access points (rogue APs) or malicious d...

WIFI Security 1 - Intro

Wi-Fi networks are often more exposed than wired ones, making them a prime target for attackers. It will be an serious threat to organisation, if the actors target the users personal and organsat...

AWS CLI

We can access the AWS environment via UI dashboard or also via Command Line Interface. Following were the list of command line and its usage on the AWS. To access the UI environment we shoud know ...

CSRF

Cross Site Request Forgery is an vulnerability which can be easily understood and exploited in the web application. And it can be found on most of the sites due to the misconfiguration. So most ...