Hello everyone! Welcome to “Malware Development in C” series! In today’s video, I will be explaining you socket programming in C! We shall first get started off by understanding basic workflow of a client and a server in socket programming …
Hey guys, In this video, we will be talking about a web vulnerability called broken access control.
Why should we learn computer architecture in order for us to become a good cyber security expert or an ethical hacker ? Now the problem with the most programmers is that they are not good computer scientists and that is …
Hey guys, In this video, we will go over the evil twin attack and how to perform it using a captive portal.
Hello guys, In this video, we are going to learn about encoding, encryption and hashing, what are the differences between these three and why they are used. Resources: blizzardwrap Tool
Hello all, In this video, we are going to discuss Linux Privilege Escalation and specifically, we are going to talk about Cronjobs and how to use them to gain root access on a Linux system. This is part one of …