The pandemic of COVID-19 has changed the every day propensities for many individuals, and working schedules are no exception. With a large number of people abruptly […]
What is OWASP? OWASP, also known as the Open Web Application Security Project, is an online platform that creates articles available freely, programs, documentation, tools, and […]
A worldwide catastrophe this contagious virus COVID-19 pandemic has raised endless problems to mankind. The restrictions we face today are something humans are not used to. […]
What is HTTP Request Smuggling? Hiding HTTP Request in HTTP Request. That is the main idea. Simple, right? Well, we can say that HTTP Request Smuggling […]
As someone who likes to tinker with hardware, we often find ourselves opening up a device to find UART pins which are originally meant for debugging […]
With the increasing growth in Internet-Of-Things (IoT) devices, it is an absolute necessity to scrutinize the security of these devices too, especially when they’re going to […]
Basic Understanding of Command and Control Malware Server
Reading time: 8/10 minutes Folks!! In this blog, I will talk about Command and Control Servers (C&Cs) and diverse procedures utilized by “assailants” “attacker” to fabricate a powerful and […]
Abusing SUDO Advance for Linux Privilege Escalation If you have a limited shell that has access to some programs using thesudocommand you might be able to […]