Sws101_ctf3
Pentesting Fundamentals Penetration test is an authorised audit of a computer system’s security and defences as agreed by the owners of the systems. SO during the test if anything that falls outsi...
Pentesting Fundamentals Penetration test is an authorised audit of a computer system’s security and defences as agreed by the owners of the systems. SO during the test if anything that falls outsi...
Metasploit : Introduction Metasploit is the most widely used exploitation framework and it is the powerful tool that can support all phases of penetration testing engagement from information gathe...
Cyber kill chain. The cyber kill chain framework is designed for identification and prevention of the network intrusions. The kill chain is a military concept related to the structure of an attac...
Windows x64 Assembly Reverse engineering is a process in which software are deconstructed to extract design information from them. Number system Base 10 : humans use the decimal( base 10) system...
Introduction to digital forensics Forensic is the application of science to investigate crimes and establish facts. Example if the law enforcement agents arrive at a crime scene and however part o...
Introductory Networking The OSI (Open Systems Interconnection) Model is a standardised model which we use to demonstrate the theory behind computer networking. In practice, it’s actually the more ...
HTTP in detail HTTP is the set of rules used for communicating with web servers for the transmitting of webpage data, whether that is HTML, Images, Videos, etc. HTTPS is the secure version of HTT...
DNS in detail DNS stands for Domain name system that provides us the simple way to communicate with the devices on the internet without remembering complex number(IP address) Each and every compu...
Topic : Recovery Algorithm Recovery algorithms are techniques to ensure database consistency, transaction atomicity, and durability despite failures These algorithms work to bring the database ba...
Topic : Concurrency Control Concurrency control is two or more things capable of operating or occuring at the at the same time. It ensure that simultaneous transactions will be parsed appropriatel...