top of page
Nov 19, 20242 min read
What is bind shell and reverse shell? Explain difference between them also explain what are different options in reverse and bind shell
Bind shell and Reverse shell are two different types of hacking techniques in order to gain unauthorized remote access to the compromised...
1 view
Nov 19, 20242 min read
What is Red teaming? Explain in detail with an example
The term “Red Team” refers to the group that pretends to be an enemy. In the cyber security context, the red team refers to the group of...
5 views
Nov 19, 20241 min read
What is LHOST and RHOST ? Explain in detail
LHOST (Local Host): This refers to the attacker's own system, the one from which the attack or exploit is initiated. It specifies the IP...
34 views
Nov 19, 20243 min read
Steps involved in configuration review, Some of the weaknesses you found in configuration reviews.
There are two approaches we can follow while performing configuration review: Automated Approach using Nessus: 1. Tool Configuration:...
6 views
Nov 19, 20242 min read
What is SSL handshake (for dummies) and how does it help in security https?
The SSL handshake is the negotiation between the two parties or can say that the communication between the client (web browser) and the...
1 view
Nov 19, 20243 min read
OSI model explained in simple terms
OSI or Open-System Interconnection Model is a reference model which describes seven layers that computer systems use to communicate over...
6 views
Nov 19, 20242 min read
What are ports?
In a computer science or network a port can be defined as both physical and logical. A port acts like a door through which data can flow...
0 views
Nov 19, 20241 min read
Why Burpsuite is able to capture https traffic?
Burpsuite is an integrated, user-interface proxy tool which is used to perform security testing of web applications or websites. It is...
15 views
Nov 19, 20242 min read
Owasp Top 10 2017 vs 2021
The Open Web Application Security Project or OWASP is an international non-profit organization that produces freely available articles,...
2 views
Nov 19, 20242 min read
All NMAP commands and why they are used?
The following are the fundamental nmap commands and their purpose as follows: Basic scan techniques: Scan name and their purpose NMAP...
16 views
bottom of page