RSS.Social

Learning by practicing

follow: @[email protected]

Posts

Coming Soon!! FREE - A Little Book On Adversarial AI

Understanding Packet Crafting - The Windows IPv6 Vulnerability - CVE-2024-38063: Remote Kernel Exploitation via IPv6

3 simple tips, for retaining your critical resources in the 21st century

**TOTAL RECALL 2024** - Memory Forensics Self-Paced Learning/Challenge/CTF

Knock! Knock!! Anyone There? - Reconnaissance and Defense

Beginning Nikto - File Upload Vulnerability testing

Beginning Nikto - SQL Injection with default evasion

Beginning Nikto - Command Execution / Remote Shell

Beginning Nikto - Remote File Retrieval with evasion type 4 -> Prepend long random string

Beginning Nikto - Injection (XSS/Script/HTML) - with evasion type 3 -> Premature URL ending

Beginning Nikto - Information Disclosure with evasion type 2 -> Directory self-reference (/./)

Beginning Nikto - Misconfiguration / Default File - with evasion type 1 -> Random URI encoding (non-UTF8)

Beginning Nikto - Scanning for interesting files seen in the logs

Beginning Fourier Transform - Detecting Beaconing in our networks

Beginning SiLK - Systems for Internet Level Knowledge - working with network flow data

Solving the CTF challenge - Network Forensics (packet and log analysis), USB Disk Forensics, Database Forensics, Stego

Packet Crafting - Tearing down a connection with TCP Reset

Understanding and Decrypting TLS based communication - HTTP over TLS (HTTPS)

Beginning Machine and Deep Learning with Zeek logs

Understanding NMAP's scan techniques: -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans

Beginning Integer Overflow/Underflow - Signed and Unsigned integers

Beginning MariaDB / MySQL - Basic Administration Stuff

Beginning MongoDB - MongoClient

Beginning SQLalchemy

Installing & configuring Elasticsearch 8 and Kibana 8 on Ubuntu