LATEST ARTICLES

Wireshark

What is Wireshark?

  What is Wireshark? Wireshark is the most common network protocol analyzer. In addition to being a free and an open source packet following the terms of the GNU General Public License(GPL),...
network pentesting

Pentester Candidate Program – July 2017

Pentester Candidate Program July 2017 The pentester program will start on this weekend. I have received so many requests to extend the pricing. So, here is an offer for today and tomorrow....
powershell

PowerShell For InfoSec Professionals – June 2017

PowerShell For InfoSec Professionals 2017 The simple fact is if you are going to be attacking or defending modern environments with newer operating systems (Windows 10, Server 2016) – you need Powershell! There is...
Infosec Addicts

CYBERWAR: Advanced Offensive Cyber Operations

cyber Security Offensive Security CYBERWAR: Advanced Offensive Cyber Operations - Night Classes I'm writing this post to let you know that the new night class version of CyberWar: Advanced Offensive Cyber Operations course which...
dvwa

How to Exploit File Upload Vulnerability (Double Extension)?

(Double Extension-Content Type- Null Byte Injection)Vulnerability What do I Need to Know First of All? To begin with, what is File Upload Vulnerability? Examples of web applications attacks: The purpose of these examples...
reverse engineering

Reverse Engineering

Coming Soon   Fill out this form to sign up for the class.
Exploit

Exploit Development

Coming Soon   Fill out this form to sign up for the class.
malware

Malware Analysis

Coming Soon   Fill out this form to sign up for the class.
Command-Line

Command-Line Log Analysis

Coming Soon   Fill out this form to sign up for the class.

Packet Analysis/Network Forensics

Coming Soon     Fill out this form to sign up for the class.
Metasploit

Next-Level Metasploit

Coming Soon     Fill out this form to sign up for the class.

Windows For InfoSec Professionals

Coming Soon     Fill out this form to sign up for the class.
dvwa

How to Exploit File Upload Vulnerability?

(Basic File Upload) What do I Need to Know First of All? What is File Upload Vulnerability? Description: In fact, one of the major risks faced by web applications is the potential to...

How to Inspect Process Hallowing?

What do I need to understand Hallowing? First of all, there are a bunch of concepts that one has to grasp very well before even proceeding any further through this technical guideline ...