Published inInfoSec Write-upsData Exfiltration Under The RadarWe are all aware of the exfiltration of sensitive data through various methods. Typically, threat actors use this technique after gaining a…Sep 21, 20241Sep 21, 20241
Published inInfoSec Write-upsDLL Side Loading Technique #Threat Hunting & #Adversary EmulationOne of my favorite techniques, which every APT group uses in cyber attacks, involves DLL SideLoading.Jan 17, 2024Jan 17, 2024
Cyber Threats on Media and Entertainment IndustryHola Hackers today we are going to discuss about operation methodologies of various Threat Actor Groups who are constantly attacking on…Jul 29, 20221Jul 29, 20221
Published inTechiepediaCertified Ethical Hacker Practical Exam GuideHola Hackers, Today I’m going to share my experience about the CEH Practical Exam, which i have cleared recently and scored 19/20, in this…Jun 9, 20225Jun 9, 20225
Published inInfoSec Write-upsOperational Methodologies of Cyber Terrorist Organization “Transparent Tribe”Hola Hackers, Today we are going to discuss about the Cyber Terrorist organization called Transparent Tribe which operates from Pakistan…May 22, 2022May 22, 2022
Published inInfoSec Write-upsSeries of Network Fundamentals #5 (Ports & Protocols),to get started in Cyber Security.Hola Hacker’s, today we are going to discuss about “Well known Port Numbers and Protocols”, which are used in Cyber Security industry…Apr 6, 2022Apr 6, 2022
Series of CTF machines Walkthrough #7 Linux Privilege Escalation using SUID permissions.Hello Hackers, In this blog we are going to learn how to escalate the privileges by exploiting the SUID bit permissions which are set to…Nov 25, 2021Nov 25, 2021
Series of CTF machines Walkthrough #6 Linux Privilege Escalation using SUDO permissions.Hello Hackers, In the last blog we learnt about “Kernel Exploit”, so make sure to read the previous blog, In this blog we are going to…Nov 24, 2021Nov 24, 2021
Series of CTF machines Walkthrough #5 Linux Privilege Escalation using Kernel Exploit.Hello Hackers, In the last blog we learnt about the different methods of Enumeration, so in this we are going to Exploit the vulnerable…Nov 24, 2021Nov 24, 2021
Series of CTF machines Walkthrough #4 Linux Privilege Escalation (Enumeration).Hello Hackers, Today we are not only going to solve the CTF machine along with that, we are going to learn about how to do Enumeration and…Oct 29, 2021Oct 29, 2021
Series of CTF machines Walkthrough #3 Previse From HackTheBox.Hello Hackers, i hope you are doing well, today we are going to solve the “Previce CTF machine from HackTheBox” which is easy and you learn…Oct 20, 2021Oct 20, 2021
Published inTechiepediaSeries of Network Fundamentals #4 (IPv4 & IPv6 Address),to get started in Cyber Security.Hello everyone, I’m back with 4th series of Network Fundamentals, in the last blog we learned about Topologies, in this blog we are going…Oct 13, 2021Oct 13, 2021
Published inTechiepediaSeries of CTF machines walkthrough #2 “LazyAdmin TryHackMe”.Hello Everyone, today Im back with amazing CTF machine called “LazyAdmin” from TryHackMe.Oct 10, 2021Oct 10, 2021
Published inTechiepediaSeries of CTF machines walkthrough for beginners #1 “Cap HackTheBox”.Hello everyone, constantly I’m going to publish walkthrough on CTF machines, which is going to be very helpful to the beginners, the CTF…Sep 26, 2021Sep 26, 2021
Published inTechiepediaHow i got a free delivery by signing up with “@company.com” #Bug Bounty write upHello everyone, today i’m back with another write-up, in this write-up i will explain, how i got a free delivery access to all my orders…Aug 13, 20212Aug 13, 20212
Published inTechiepediaSeries of Network Fundamentals #3 (Topologies & Network Devices), to get started in Cyber Security.TopologiesAug 12, 2021Aug 12, 2021
Published inInfoSec Write-upsSeries of Network Fundamentals #2 (OSI Model), to get started in Cyber Security.Hello everyone, i’ m back with second series of Network Fundamentals, in the last blog we learned what are the types of networks, in this…Aug 8, 2021Aug 8, 2021
Published inTechiepediaSeries of Network Fundamentals |#1 Getting started with Cyber SecurityHello everyone, today i’ m going to explain one of the most essential and foundation topic in Cyber Security that is “Network…Aug 8, 2021Aug 8, 2021
Published inTechiepediaLearn the fundamentals of Cyber Security and win amazing vouchers by TryHackMeHello everyone, Today i’m going to share my experience on “Pre-Security” learning path, introduced by TryHackMe.Jul 8, 2021Jul 8, 2021
Published inTechiepedia2F-Authentication Bypass in Sign-up PageHello everyone, Today i’m going to share how i found 2F-Authentication Bypass vulnerability in singup page and found the same vulnerability…Jun 28, 20211Jun 28, 20211