Blog

0 Comments 16 Apr 2024
How To Secure Our Personal Systems and Social Media Handel’s

6 ways to protect your personal information online Create strong passwords. ... Don't overshare on…

0 Comments 01 Apr 2024
How to Secure Our Network

In today's digitally connected world, securing your network is more critical than ever. From personal…

0 Comments 29 Mar 2024
Securing IoT Devices

INTRO: In the rapidly evolving landscape of technology, the Internet of Things (IoT) has emerged…

0 Comments 26 Mar 2024
Best CTF Platforms for Practice Ethical Hacking Skills

What is Capture the Flag (CTF)? Capture the Flag (CTF) in Cyber Security is essentially…

0 Comments 12 Mar 2024
Path Traversal Attacks

Path traversal or directory traversal is the vulnerability that allows an attacker to access files…

0 Comments 12 Mar 2024
API Pentesting

API Pentesting API (Application Programming Interfaces) enable software systems and applications to communicate and share…

0 Comments 12 Mar 2024
File upload Vulnerabilities

What are file upload vulnerabilities? File upload vulnerabilities are when a web server allows users…

0 Comments 02 Feb 2024
Cross Site Scripting (XSS)

What is Cross-Site Scripting (XSS)? Cross-site scripting (also known as XSS) is a web security…

0 Comments 31 Jan 2024
JWT (JSON Web Token) Attacks

What are JWTs?  A JSON Web Token (JWT), pronounced as "jwt," serves as an open…

0 Comments 30 Jan 2024
Daily Bugle WalkThrough Lab (TryHackMe )

Here I wanna share a walkthrough/explain my thoughts while doing the TryHackMe room “Daily Bugle”.…