WriteUp TakeOver Room (CTF) TryHackMeI was using the attack box provided by TryHackMe.Dec 29, 2024Dec 29, 2024
Write Up for Sakura Room (CTF)Task 1: Introduction In this task there is not much to do; just type “Let’s Go!”. In the answer section we can pass this task easily.Dec 27, 2024Dec 27, 2024
Web Application Vulnerabilities: A Deep DiveAttackers attack web applications to exploit various vulnerabilities. Understanding these vulnerabilities is critical to securing…Dec 21, 2024Dec 21, 2024
Cryptography: The Art of Secure CommunicationCryptography is a technique of securing information and communications through the use of codes so that only those persons for whom the…Dec 21, 2024Dec 21, 2024
The Role of Virtualization in CybersecurityVirtualization means the use of a virtual environment that mimics hardware or software systems.Virtualization helps to use multiple OSs or…Dec 20, 2024Dec 20, 2024
Networking Devices and Their Role in Secure CommunicationNetworking devices are the backbone of modern networks. It manages communication within and between networks. It ensures seamless…Dec 20, 2024Dec 20, 2024
Exploring Network TopologiesNetwork topology means the way devices are arranged in a network and how they are connected to each other.There are many types of…Dec 20, 2024Dec 20, 2024
The OSI Model: A Layered Approach to NetworkingThe OSI Model (Open Systems Interconnection) divides networking into seven different layers, with each having their own specific function…Dec 19, 2024Dec 19, 2024
Networking BasicsNetworking is a way in which computers and devices can share resources, exchange data, and communicate efficiently using wired or wireless…Dec 18, 2024Dec 18, 2024
Hacking Methodologies and FrameworksHacking Methodology: PTES (Penetration Testing Execution Standard)Dec 18, 2024Dec 18, 2024