Computer Networking
Real Hackers Don’t Guess - They Nmap it!
Jun 05, 2020 Computer Networking

When you enter your first CTF or OSCP lab, there is one tool that becomes your best friend, your compass, and sometimes your only hope. That tool is Nmap. In the world of hacking, information is...

SSH - The Hero That Saved Your Passwords
Jun 04, 2020 Computer Networking

Admins were tired. For years, they used Telnet to log into remote servers. It worked—but it exposed every keystroke. If Alice typed her password, Trudy the attacker could see it. Networks were...

Telnet - The Old-School Tool of Networking
Jun 03, 2020 Computer Networking

Once upon a time, in the early days of networking, there was a mighty tool called Telnet. It allowed people to connect to computers remotely, type commands, and feel like wizards controlling machines...

Active Directory
May 10, 2020 Computer Networking

If you’ve ever worked in a corporate IT environment, chances are you’ve heard of Active Directory (AD). It’s one of the most widely used directory services in the world, powering authentication and...

SMB - Simple Message Block Protocol
May 09, 2020 Computer Networking

CORS - Cross Origin Request Sharing
May 05, 2020 Computer Networking

Cross Origin Resource Sharing (CORS) is a crucial web security mechanism that controls how web pages from one domain can access resources from another domain. Understanding CORS is essential for...

SYN flooding - The basic of DOS Attacks
May 03, 2020 Computer Networking

SYN flood attack is a classic way to understand Denial of Service (DoS) attacks and how TCP resource exhaustion works. It's a common attack vector in security assessments, and knowing how it works...

TCP and Its Three-Way Handshake
May 01, 2020 Computer Networking

In the world of networking, reliable communication is critical. Whether you're streaming a video, browsing a website, or sending a file, chances are the Transmission Control Protocol (TCP) is working behind the scenes to ensure your data gets to its destination intact and in order.

HTTP Header Injection Explained
Apr 30, 2020 Computer Networking

HTTP Header Injection is a critical web security vulnerability that occurs when an application allows user controlled input to be inserted into HTTP response headers without proper validation or...

Common Networking Protocols
Apr 05, 2020 Computer Networking

IP TCP UDP HTTP HTTPS DHCP SSH Telenet FTP SFTP SMB RDP SNMP RIP SMTP IMAP POP3 LDAP WPA2 WPA3 IPsec WEP

Networking  0x100 - IP Addressing and Subnets
Mar 02, 2020 Computer Networking

Internet Protocol (IP) Addressing is a core concept of networking. It enables devices to identify and communicate with each other over a network, especially the internet. In this tutorial we are...

Netcat The Hacker's Swiss Army Knife
Feb 27, 2020 Computer Networking

Netcat, often abbreviated as , is a versatile command line networking tool that can be used for almost anything related to TCP, UDP, or UNIX domain sockets. It's beloved by network engineers,...