Published inInfoSec Write-upsContagious Interview Campaign — A Phishing MethodologyContagious Interview CampaignFeb 281Feb 281
Published inInfoSec Write-upsWalkThrough of Wanna Cry RansomwareWanna cry is a self propagating malware which is classified as crypto-ransomware affecting more than 200K computers in 2017. A Crypto…Apr 9, 2023Apr 9, 2023
Published inInfoSec Write-upsCORS and Its MisconfigurationsBefore Understanding CORS, we need to know about SOP(Same Origin Policy). SOP is built as a security mechanism to safeguard web…Oct 22, 2021Oct 22, 2021
Published inInfoSec Write-upsCSRF for BegginersCSRF(Cross-site request forgery) is a web application technique where an attacker induces the user to click on a malicious link that…Oct 17, 2021Oct 17, 2021
Published inInfoSec Write-upsWalkThrough on MarketPlace Box(THM)Let’s Solve the box called ‘MarketPlace’ from TryhackmeAug 3, 2021Aug 3, 2021
Published inInfoSec Write-upsWalkThrough on Ra Box(THM)Let’s Solve the box called ‘Ra’ from TryhackmeJul 8, 2021Jul 8, 2021
Published inInfoSec Write-upsDetailed Walkthrough on Relevant Box(THM)Let’s Solve the box called ‘Relevant’ from TryhackmeJun 29, 2021Jun 29, 2021
Published inInfoSec Write-upsWalk Through on AttacktiveDirectory box(THM)Active Directory:-Active Directory is a database and set of services that connect users with the network resources they need to get their…Jun 17, 2021Jun 17, 2021