Sign in

A humble learner of everything around IT especially in IT implementation, governance, risk management, and cybersecurity.
  1. Assessing HTTP requests
  2. Exploit php 8.1.0-dev to get backdoor and reverse shell
  3. Exploit knife to issue OS command as root
nmap -A -v 10.10.10.242Legends:
A : a lot of scans…


Image by Darwin Laganzon from Pixabay

Photo by Kelly Sikkema on Unsplash





Thinking Process



Book Cover

Thinking Background


XML Recursive

Story Telling

joshuanatan

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store