Wi-Fi networks are often more exposed than wired ones, making them a prime target for attackers. It will be an serious threat to organisation, if the actors target the users personal and organsat...
AWS CLI
We can access the AWS environment via UI dashboard or also via Command Line Interface. Following were the list of command line and its usage on the AWS. To access the UI environment we shoud know ...
CSRF
Cross Site Request Forgery is an vulnerability which can be easily understood and exploited in the web application. And it can be found on most of the sites due to the misconfiguration. So most ...
Core Windows Process
Windows In this post i worked on the windowsinternals and how the normal windows processes look like, so that we can identify between the normal and malicious processes on system. Windows is in on...
MITRE-ATT&CK
Hello World As a security analyst/cyber security person we might know about MITRE as a framework, but the actual intent of MITRE is safety,stability and well-being of nation(includes cyber space, ...
Containers
Containers Containers are just a process (or a group of processes) running in isolation, which is achieved with Linux namespaces and control groups. Linux namespaces and control groups are features...
SQLi
Yay its a post about SQLi. As per the OWASP Top 10 2017 it is a positioned as 1 and Rank 6 according to SANS TOP 25 of 2019. SQLi attack makes it possible to execute malicious SQL statements. Th...
System Malware-3
It is important for us to be able to understand C and C++ program binaries. As a beginner we will be restricting ourselves to just inspect C binaries. This can be extended to C++ binaries as well. ...
Nmap
Nmap Hi, In the world of hacking and malware analysis it is useful to know about the tools which make your work less and find the information about target in less amount of time. One of such tool...
System Malware-2
Hi, In this post i again try to start the system malware analyse by experimenting in the virtual environment. I hope you may have fun. I think system malware is a vast chapter which may take more ...