Apr 113 minPenetration TestingDeep Dive into Penetration Testing MethodologiesPenetration testing: deep diving into cybersecurity's abyss, where bugs are the new buried treasure and the sharks are wired....
Feb 710 minNetworkWhat is Domain Naming System: A Complete DNS tutorialDNS or the Domain Naming System acts as a translator between human understandable domains and IP addresses. Learn more about it in this blog
Jan 36 minRed TeamingWhat is a honeypot and how does it work?Honeypots is catfishing in the world of cybersecurity – no candlelit dinners, just firewalls and encrypted love letters to trap hackers!...
Jan 26 minVulnerabilityOpera Browser Zero-Day RCE Vulnerability on Cross-PlatformsIn a recent investigation a zero-day vulnerability surfaced within the popular Opera web browser family. This flaw, allows attackers RCE.
Nov 21, 20234 minFuzzingUnleashing the Power of Scapy for Protocol FuzzingScapy's comprehensive set of features enables the creation of customized network traffic, making it an ideal tool for fuzzing.