Learning by practicing
Coming Soon!! FREE - A Little Book On Adversarial AI
Understanding Packet Crafting - The Windows IPv6 Vulnerability - CVE-2024-38063: Remote Kernel Exploitation via IPv6
3 simple tips, for retaining your critical resources in the 21st century
**TOTAL RECALL 2024** - Memory Forensics Self-Paced Learning/Challenge/CTF
Knock! Knock!! Anyone There? - Reconnaissance and Defense
Beginning Nikto - File Upload Vulnerability testing
Beginning Nikto - SQL Injection with default evasion
Beginning Nikto - Command Execution / Remote Shell
Beginning Nikto - Remote File Retrieval with evasion type 4 -> Prepend long random string
Beginning Nikto - Injection (XSS/Script/HTML) - with evasion type 3 -> Premature URL ending
Beginning Nikto - Information Disclosure with evasion type 2 -> Directory self-reference (/./)
Beginning Nikto - Misconfiguration / Default File - with evasion type 1 -> Random URI encoding (non-UTF8)
Beginning Nikto - Scanning for interesting files seen in the logs
Beginning Fourier Transform - Detecting Beaconing in our networks
Beginning SiLK - Systems for Internet Level Knowledge - working with network flow data
Solving the CTF challenge - Network Forensics (packet and log analysis), USB Disk Forensics, Database Forensics, Stego
Packet Crafting - Tearing down a connection with TCP Reset
Understanding and Decrypting TLS based communication - HTTP over TLS (HTTPS)
Beginning Machine and Deep Learning with Zeek logs
Understanding NMAP's scan techniques: -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
Beginning Integer Overflow/Underflow - Signed and Unsigned integers
Beginning MariaDB / MySQL - Basic Administration Stuff
Beginning MongoDB - MongoClient
Beginning SQLalchemy
Installing & configuring Elasticsearch 8 and Kibana 8 on Ubuntu