PinnedPublished inSystem WeaknessExtracting Saved Passwords from Web Browsermost of the users use web browsers to save their passwords of Facebook, Gmail, and other popular social media as it is very easier and less…Aug 8, 2022Aug 8, 2022
PinnedPublished inInfoSec Write-upsCreating a basic backdoor on an android mobileIn this article you’ll be learning the most basic way to hack an android mobile phone using Metasploit framework.Aug 9, 20221Aug 9, 20221
PinnedPublished inInfoSec Write-upsES File Explorer Open Port Vulnerability exploitationES File Explorer (File Manager) is a full-featured file (Images, Music, Movies, Documents, app) manager for both local and networked use…Aug 7, 20221Aug 7, 20221
Published inInfoSec Write-upsLooking for Broken Access Control Vulnerabilities in websitesAccording to OWASP top 10, Broken access control is one of the most exploited vulnerabilities in the web applications resulting countless…Oct 23, 2023Oct 23, 2023
Published inSLIIT FOSS CommunityA basic way to send ‘Spoofed Emails’When it comes to phishing emails everyone is aware of the “From” address header of email whether if it was came from the original domain…Jan 20, 20231Jan 20, 20231
Published inSLIIT FOSS CommunityPost Exploitation: Transferring Files Between Linux HostsAfter taking over a PC by exploiting a vulnerability you might wander…Aug 14, 20221Aug 14, 20221
Published inInfoSec Write-upsHow to Install Elastic Stack on Ubuntu 22.04 LTSWhat is Elastic Stack?Jul 28, 2022Jul 28, 2022
An overview of a security operation centerA Security Operation Center (SOC) is a centralized function inside an organization that employs people, procedures, and technology to…Jul 23, 2022Jul 23, 2022
Evaluation of Cryptographic Functions and Encryption methodsPrivacy leakage of user data when it comes to online platform is a critical issue in modern era. Those data can be recovered by hackers for…Jul 23, 2022Jul 23, 2022
A Study on Social Media EncryptionBecause no one else, even the service provider, has the ability to decode the data, End to End Encryption(E2EE) is far more secure than…Jul 23, 2022Jul 23, 2022