Published inAWS TipWhat is Cryptography?Cryptography is the study of encryption and encryption algorithms. In a practical sense, encryption is the conversion of messages from a…Nov 7, 2022Nov 7, 2022
Published inCodeXHow To Attacking The Domain Controller🤔😮😮If you were lucky enough to get a local administrative account or a domain admin account, the next target is usually the Domain Controller…Oct 26, 20221Oct 26, 20221
How To Attack Target On The Internet?🤫🤫You know what types of black hats exist, but a question still remains: how do they find you? Most people don’t expect to be targeted by an…Oct 23, 2022Oct 23, 2022
How To Set Up A Penetration Testing Lab??☠ Danger: Do it at your own risk. I am not responsible for any problem you face. This is for Education purposes. ☠Oct 16, 2022Oct 16, 2022
The FBI Always Gets Its Man😱😱In the science fiction section of the Glen Park branch of the San Francisco Public Library, not far from his apartment, Ross William…Oct 10, 2022Oct 10, 2022
Things Your Boss Doesn’t Want You to Know😉😉If you’ve read this far, you’re obviously concerned about privacy, but for most of us, it’s not a matter of hiding from the federal…Oct 8, 2022Oct 8, 2022
Web Application Firewalls (●'◡'●)(part 2)Many applications are protected by an external component residing either on the same host as the application or on a network-based device…Oct 3, 2022Oct 3, 2022
How To Attacking the Application Server (●'◡'●)As with any kind of application, a web application depends on the other layers of the technology stack that support it, including the…Oct 2, 2022Oct 2, 2022