What is Wireshark?

  What is Wireshark? Wireshark is the most common network protocol analyzer. In addition to being a free and an open source packet following the...

Pentester Candidate Program – July 2017

Pentester Candidate Program July 2017 The pentester program will start on this weekend. I have received so many requests to extend the pricing. So, here...

PowerShell For InfoSec Professionals – June 2017

PowerShell For InfoSec Professionals 2017 The simple fact is if you are going to be attacking or defending modern environments with newer operating systems (Windows 10,...

CYBERWAR: Advanced Offensive Cyber Operations

cyber Security Offensive Security CYBERWAR: Advanced Offensive Cyber Operations - Night Classes I'm writing this post to let you know that the new night class version of...

How to Exploit File Upload Vulnerability (Double Extension)?

(Double Extension-Content Type- Null Byte Injection)Vulnerability What do I Need to Know First of All? To begin with, what is File Upload Vulnerability? Examples of...

Reverse Engineering

Coming Soon   Fill out this form to sign up for the class.

Exploit Development

Coming Soon   Fill out this form to sign up for the class.

Malware Analysis

Coming Soon   Fill out this form to sign up for the class.

Command-Line Log Analysis

Coming Soon   Fill out this form to sign up for the class.

Packet Analysis/Network Forensics

Coming Soon     Fill out this form to sign up for the class.

Next-Level Metasploit

Coming Soon     Fill out this form to sign up for the class.

Windows For InfoSec Professionals

Coming Soon     Fill out this form to sign up for the class.

How to Exploit File Upload Vulnerability?

(Basic File Upload) What do I Need to Know First of All? What is File Upload Vulnerability? Description: In fact, one of the major risks faced...

How to Inspect Process Hallowing?

What do I need to understand Hallowing? First of all, there are a bunch of concepts that one has to grasp very well before even...