Windows Event Log Forensics: A Comprehensive GuideWindows event logs serve as the digital breadcrumbs users leave while interacting with a Windows operating system. These logs are…Dec 1Dec 1
Demystifying HTTP Request Smuggling: Detection to ExploitationLet’s delve into the intriguing world of **HTTP Request Smuggling**. 🕵️♂️Feb 17Feb 17
Easy Wi-Fi HackingIntroduction: Wi-Fi has become an integral part of our daily lives, enabling us to connect to the internet from anywhere, anytime. However…Nov 25, 20231Nov 25, 20231
Exploiting KeepassIn an era where cybersecurity threats are increasingly sophisticated, the importance of secure password management cannot be overstated…Sep 30, 2023Sep 30, 2023
Sudoedit Local Privilege Escalation Vulnerability (CVE-2023–22809)On January 18th, 2023, Synacktiv released an advisory regarding a vulnerability in sudo (CVE-2023–22809). This vulnerability allows users…Aug 27, 20231Aug 27, 20231
Exploiting Ultimate Member WordPress Plugin VulnerabilityOn July 1st,2023, there was news that a “Vulnerability in WordPress plugin with 200,000+ active installations allows full site takeover…Jul 9, 2023Jul 9, 2023
How CSRF bypass has helped me earnObjective: Understanding Cross-Site Request Forgery (CSRF) and Its Implementation.Jun 3, 2023Jun 3, 2023
Hacking IP CameraRTSP is Known as Real-time Streaming Protocol and is supported by all IP cameras, network video recorders, hybrid video recorders, and many…Mar 15, 2023Mar 15, 2023