The Link That Lies: How a Phishing Redirect Hides Behind Amazon S3-and How a DNS Firewall Stops It.For a few months, I was constantly getting emails about failed subsystem deliveries from Google. At first, I ignored it. But now, the…Oct 31Oct 31
BASIC ARCHITECTURE OF A UNIX/LINUX SYSTEMA Unix system is typically viewed as a layered structure. There are several layers in the structure. So, let’s talk about the layers first…Aug 28Aug 28
The Evolution of Cyber Warfare: From Traditional Hacking to Nation-State Espionage in 2025All Nation-State Espionage, the boundaries of cyber surveillance will become increasingly blurred. This shift is not only the result of…Jan 5Jan 5
TOPPO Walkthrough: VulnhubTOPPO is a linux based machine which is available on Vulnhub: https://www.vulnhub.com/entry/toppo-1,245/Jul 29, 2024Jul 29, 2024
Android Security ArchitectureAndroid Architecture is one of the most important topic in Android Application Penetration Testing.Jul 7, 2024Jul 7, 2024
Dark Web: Hidden Side of InternetKEY CONCEPTSSep 10, 2023A response icon4Sep 10, 2023A response icon4
Wgel CTF: WalkthroughThis is a very easy machine, in which we have to get into the machine through SSH and then we have to escalate our privileges to get the…Sep 9, 2023Sep 9, 2023