-
In this blog, I’ll share my experience taking and passing the eLearnSecurity Certified Professional Penetration Tester (eCPPTv2) certification. This journey was an insightful mix of technical skills and strategy, and I hope sharing it here will help others navigate similar paths. Pivoting is important Pivoting was a crucial part of the exam. Understanding port forwarding […]
-
Email security uses URL rewriting to alter every URL it finds in an email body or attachments in order to direct user clicks to a security server or checkpoint for analysis against known threat databases, organization set policies, and verifying its safety before redirecting it to the intended destination. In this blog, I will share […]
-
Hi, In this blog, I wish to share some of my learnings and tips for penetration testing Multi-factor Authentication. What is Multi-Factor Authentication (MFA) Just like your passwords, Multi Factor Authentication is an added layer of security that requires additional factors (usually two or more pieces of information) from the user to validate that the […]
-
Introduction In this article, I have briefly discussed the basics of memory architecture and Buffer Overflow vulnerability. I have also demonstrated the method of exploiting the vulnerability using Tryhackme Lab. For those interested in delving deeper, additional research on this topic is recommended. Buffer is a region of memory (RAM) that is used to store […]