Published inInfoSec Write-upsData Exfiltration Under The RadarWe are all aware of the exfiltration of sensitive data through various methods. Typically, threat actors use this technique after gaining a…Sep 21Sep 21
Published inInfoSec Write-upsDLL Side Loading Technique #Threat Hunting & #Adversary EmulationOne of my favorite techniques, which every APT group uses in cyber attacks, involves DLL SideLoading.Jan 17Jan 17
Cyber Threats on Media and Entertainment IndustryHola Hackers today we are going to discuss about operation methodologies of various Threat Actor Groups who are constantly attacking on…Jul 29, 20221Jul 29, 20221
Certified Ethical Hacker Practical Exam GuideHola Hackers, Today I’m going to share my experience about the CEH Practical Exam, which i have cleared recently and scored 19/20, in this…Jun 9, 20225Jun 9, 20225
Published inInfoSec Write-upsOperational Methodologies of Cyber Terrorist Organization “Transparent Tribe”Hola Hackers, Today we are going to discuss about the Cyber Terrorist organization called Transparent Tribe which operates from Pakistan…May 22, 2022May 22, 2022
Published inInfoSec Write-upsSeries of Network Fundamentals #5 (Ports & Protocols),to get started in Cyber Security.Hola Hacker’s, today we are going to discuss about “Well known Port Numbers and Protocols”, which are used in Cyber Security industry…Apr 6, 2022Apr 6, 2022
Series of CTF machines Walkthrough #7 Linux Privilege Escalation using SUID permissions.Hello Hackers, In this blog we are going to learn how to escalate the privileges by exploiting the SUID bit permissions which are set to…Nov 25, 2021Nov 25, 2021
Series of CTF machines Walkthrough #6 Linux Privilege Escalation using SUDO permissions.Hello Hackers, In the last blog we learnt about “Kernel Exploit”, so make sure to read the previous blog, In this blog we are going to…Nov 24, 2021Nov 24, 2021
Series of CTF machines Walkthrough #5 Linux Privilege Escalation using Kernel Exploit.Hello Hackers, In the last blog we learnt about the different methods of Enumeration, so in this we are going to Exploit the vulnerable…Nov 24, 2021Nov 24, 2021
Series of CTF machines Walkthrough #4 Linux Privilege Escalation (Enumeration).Hello Hackers, Today we are not only going to solve the CTF machine along with that, we are going to learn about how to do Enumeration and…Oct 29, 2021Oct 29, 2021