Why should we learn computer architecture in order for us to become a good cyber security expert or an ethical hacker ? Now the problem with the most programmers is that they are not good computer scientists and that is …
Hey guys, In this video, we will go over the evil twin attack and how to perform it using a captive portal.
Hello guys, In this video, we are going to learn about encoding, encryption and hashing, what are the differences between these three and why they are used. https://youtu.be/-1aIOVrTc0U Resources: blizzardwrap Tool
Hello all, In this video, we are going to discuss Linux Privilege Escalation and specifically, we are going to talk about Cronjobs and how to use them to gain root access on a Linux system. This is part one of …
Hello everyone, In the previous parts of mastering burp suite, we have talked about the important and useful sections. In this video, we will focus on the remaining sections on burp suite.
Hey there! In this post, we are going to learn about: Padding oracle attack. What is padding? Public key cryptography standards (pkcs #5 & pkcs #7). Detection of padding oracle as a web penetration tester and its exploitation. Padding oracle …