Home
Prakash Kumar
Cancel

Core Windows Process

Windows In this post i worked on the windowsinternals and how the normal windows processes look like, so that we can identify between the normal and malicious processes on system. Windows is in on...

MITRE-ATT&CK

Hello World As a security analyst/cyber security person we might know about MITRE as a framework, but the actual intent of MITRE is safety,stability and well-being of nation(includes cyber space, ...

Containers

Containers Containers are just a process (or a group of processes) running in isolation, which is achieved with Linux namespaces and control groups. Linux namespaces and control groups are features...

SQLi

Yay its a post about SQLi. As per the OWASP Top 10 2017 it is a positioned as 1 and Rank 6 according to SANS TOP 25 of 2019. SQLi attack makes it possible to execute malicious SQL statements. Th...

System Malware-3

It is important for us to be able to understand C and C++ program binaries. As a beginner we will be restricting ourselves to just inspect C binaries. This can be extended to C++ binaries as well. ...

Nmap

Nmap Hi, In the world of hacking and malware analysis it is useful to know about the tools which make your work less and find the information about target in less amount of time. One of such tool...

System Malware-2

Hi, In this post i again try to start the system malware analyse by experimenting in the virtual environment. I hope you may have fun. I think system malware is a vast chapter which may take more ...

Cross Site Scripting

XSS XSS is most common because of user input is validated or encoded. Using XSS it is possible to access cookie, session tokens, and other sensitive information of victim. Vector - Javascript, HTM...

Something about RAM

Why this post When i planned to upgrade my Ram i faced some issues like what is my ram type, is it suitable for my motherboard, how many slot will be in my motherboard. Yes it is mandatory before ...

Burp suite configuration

Getting started with Burp suite Burp suite is a tool which is used in penetration testing. It contains collection of tools used to analyse a web application. Before installing Burp into your machi...