XML-RPC EXPLOITATION I recently came across a bug bounty program that taught me how to exploit XML-RPC. XML-RPC enabled on a site can have several […]
Cybersecurity Books
Mr Kharim Mchatta has recently published his 4 books which are intended to help individuals who are trying to get started in cybersecurity have the […]
Introduction to Docker
I recently decided to learn more about docker, I did my research on how to install docker on Kali Linux and Debian, how to install […]
Press-Enum (WordPress Hacking tool)
PRESS-ENUM When doing a penetration test not each engagement is going to be the same. Each penetration test would require some sort of re adjustment […]
Careers in Cybersecurity
CAREERS IN CYBERSECURITY A misconception that a lot of people have about this industry is that cybersecurity requires an individual to be a tech savvy […]
Access Control & Privilege Escalation
I recently came across a penetration test that taught me how to bypass the present access control and perform privilege escalation. The client’s website was very […]
Installing and Configuring Snort
I recently came across a project that taught me how to install and configure snort on a host. The main purpose of this was the […]
Cybersecurity Entry Path
The most common and frequently asked question to cybersecurity expert by newbies is how do I get started into cybersecurity? Where can I learn cybersecurity? […]
Installing and Configuring CTFd
Recently I came across a project that taught me how to install, setup and configure CTFd. The aim of this project was to have a […]
Reverse Engineering Malware
I recently came across a penetration test that taught me how to reverse engineer a malware. This malware caused Obfuscation for several days to the […]
