Published inInfoSec Write-upsbWAPP — HTML Injection — Reflected (URL)HTML injection is a type of injection vulnerability that occurs when a user is able to control an input point and is able to inject…Feb 22Feb 22
Published inInfoSec Write-upsbWAPP — HTML Injection — Reflected (POST) Low Security LevelHTML injection is a type of injection vulnerability that occurs when a user is able to control an input point and is able to inject…Feb 20Feb 20
Published inInfoSec Write-upsbWAPP — HTML Injection — Reflected (GET) Low Security LevelHTML injection is a type of injection vulnerability that occurs when a user is able to control an input point and is able to inject…Feb 20Feb 20
Published inInfoSec Write-upsFlying Under the AV Radar — Part 01After a months of research, I decided to bring some articles on evading Anti-Virus software. This is the first article of the series and…Dec 22, 2023Dec 22, 2023
Published inPurple TeamThe Synergy of Cyber Threat Intelligence and Military Intelligence: How They Complement Each OtherIn today’s world, national security is not just a matter of physical threats but also virtual ones. As we rely more and more on technology…Mar 13, 2023Mar 13, 2023
The Ethics of Using Deepfakes in Cybersecurity: A Balancing Act Between Protection and PrivacyIn recent years, the rise of deepfakes has caused widespread concern about their potential for malicious use, such as spreading fake news…Feb 26, 2023Feb 26, 2023
Published inInfoSec Write-upsUnleashing the Power of Purple Team: Why Collaborative Security Strategies are the Future of…In the world of cybersecurity, organizations need to have a solid strategy in place to protect their assets from potential threats. The…Feb 26, 2023Feb 26, 2023
eJPT in My Point of ViewI am writing a post after about a year since I have been busy with studies and work. Nowadays a lot is going on in our country and people…Jul 4, 2022Jul 4, 2022
Published inInfoSec Write-upsVulnHub — VulnCMS:1 WalkthroughVulnCMS:1 is an easy level, Mr. Robot themed boot2root CTF challenge where you have to enumerate the box , find the CMS version, and…Jul 17, 2021Jul 17, 2021
Published inInfoSec Write-upsVulnHub — Hacksudo: ProximaCentauri WalkthroughVulnHub — Hacksudo:ProximaCentauri is a medium level boot2root challenge where you have to enumerate the machine thoroughly and exploit a…Jul 11, 2021Jul 11, 2021