Published inSystem WeaknessIncident Detection and ResponseAs a cyber consultant that has never been in a security operational team, I find it really difficult to understand how these processes…Jun 1, 2023Jun 1, 2023
HTB —KnifeHack the box (HTB) Knife machine walkthrough writeup using PHP 8.1.0-dev exploit and knife command exploitJul 25, 20211Jul 25, 20211
Incident Response — Cyberattack life cycle.Every cyberattack has a lifecycle. This is the process of the attacker in gaining access until they accomplish the attack objective.Feb 13, 2021Feb 13, 2021
Introduction to Incident ResponseIncident response is one of the domain in the CSF that helps organization to ensure their readiness of incident handling and recoveryFeb 13, 2021Feb 13, 2021
Root-Me Writeup — Remote File InclusionRemote file inclusion challenge writeup from Root Me PlatformDec 6, 20201Dec 6, 20201
Remote File Inclusion & Local File Inclusion (RFI & LFI)This article explains how to exploit RFI and LFI vulnerability in a web application, the differences between them, and the attack schemeDec 5, 2020Dec 5, 2020
Root-Me Writeup — PHP EvalPHP Eval challenge writeup from the root me platformDec 4, 20201Dec 4, 20201
Programming for Non-IT related Job Part 2How programming actually works to solve problem and how a programmer actually program a program to help their daily jobs.Dec 3, 2020Dec 3, 2020
Programming for Non-IT Related JobComputer programming is a necessary skill you need to learn. It really helps you through repetitive tasks and makes you better than robotsDec 2, 2020Dec 2, 2020
Published inThe StartupQuantitative Risk Assessment Using FAIRQuantifying risk using FAIR framework is a whole new risk assessment process you can get. It helps organization prioritze risk better.Nov 26, 2020Nov 26, 2020