sinfuloath

CTI – Part 4

Ok everyone, I hope you have enjoyed this series thus far. We have been moving right through some Cyber Threat Intelligence (CTI) concepts and we have covered a lot of ground thus far. Now I think it is important to talk about one of the main components of CTI – Tactics, Techniques, and Procedures (TTP) […]

CTI – Part 4 Read More »

Knife

Hey, this is actually my 1st HTB box write-up as well as box. It is actually an easy marked box. After completing some easy boxes, I will move to those boxes which actually are relevant to writing pentesting reports. Actually, I was ready to make a pentesting report in this room, but this room is

Knife Read More »

Choosing a Password Manager

The contenders: Bitwarden Keeper security 1Password References:  Website. Bitwarden Keeper Security 1Password Pcmag review. Bitwarden Keeper security 1Password BitWarden Website: https://bitwarden.com/ Price: $3 per user/month Compatibility: Windows, Mac, Linux, android, iOS Browser extension: Yes Password Sharing: Yes Open-Source: Yes Import Passwords: Yes Encryption:  end-to-end AES-256 bit encryption, salted hashing, and PBKDF2 SHA-256. Features:  Built-in File

Choosing a Password Manager Read More »

METASPLOIT For Beginners

Hello, Friend! Metasploit has been the holy grail of security tools for some years now. It can be used by almost anyone, whether you’re a script kiddie or an expert. That’s why I will be going through a walkthrough today to show you the full exploitation process on Metasploit. This walkthrough is heavily influenced by

METASPLOIT For Beginners Read More »

LINUX CLI TRAINING WHEELS

Linux CLI Training Wheels  Welcome to my first article ever, on anything! This article is going to cover the basic raw commands to get you moving around the FHS ( File Hierarchical System) that all Linux OS function under.  From one beginner to another, learning the Linux file system can be ridiculously overwhelming and push

LINUX CLI TRAINING WHEELS Read More »

Injection

Overview from OWASP reference What are injection-based vulnerabilities? Almost any source of data can be an injection vector, environment variables, parameters, external and internal web services, and all types of users. Injection flaws occur when an attacker can send hostile data to an interpreter. Injection flaws are very prevalent, particularly in legacy code. Injection vulnerabilities

Injection Read More »

Owasp top 10 – 2020

What makes the OWASP top 10 so important? Due to the importance of Application Security in reducing overall IT risk, the OWASP Top 10 has been adopted or referenced by a large number of government agencies, industry standards bodies, and prominent companies such as Microsoft, PCI Security Standards Council, Citibank, NIST, and others.  These organizations

Owasp top 10 – 2020 Read More »

Scroll to Top
Scroll to Top