Unrestricted file upload | RCE | weak password | d-bus vulnerability

Enumeration


Business Logic Vulnerability | ADM Group

Summary


AZ-900 - Basics of Azure Cloud Computing

How I planned my Azure Fundamentals Preparation?

Free Learning Resources


Server-Side Template Injection | Splunk UF RCE

Summary


Issues: open svn port > misconfigured svn system > unrestricted file upload > misconfigured settings

Summary


Installing Ghidra

Why Perform Reverse Engineering for Security Purpose?


https://www.101computing.net/symmetric-vs-asymmetric-encryption/

Steps to Perform Symmetric Encryption


DIVA Android App

https://pentesttools.net


Securing the Modern Threat landscape

Photo by İsmail Enes Ayhan on Unsplash

Shared Responsibilities for Overall Cloud Security


Learning to find the Treasure Trove of Information

Photo by Roman Kraft on Unsplash

Scenario 1 - Understand SPF, DKIM and DMARC

K O M A L

Cyber Security Enthusiast || Aspiring Red-Teamer

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store