Black Friday has become the day of fantastic sales not just across markets, but for the whole community of cybersecurity. It provides an opportunity for individuals and businesses to purchase security tools, certifications, and training programs at ridiculously low prices. Such occasions are meant for small businesses to have something affordable and yet be able […]
Latest Posts
HackTheBox – PermX Walkthrough
Before starting any HackTheBox machine there are a few rituals that need to be done i.e. let’s add the IP and Host to the /etc/hosts file and start with the Nmap scan.
Understanding the scopes of bean , their life and how to configure them
Cryptography writeups of all the challenges asked in the VishwaCTF 2022 edition
VishwaCTF’22 Writeups: Forensics
Forensics writeups of all the challenges asked in the VishwaCTF 2022 edition
VishwaCTF’22 writeups: Web
Web writeups of all the challenges asked in the VishwaCTF 2022 edition
Capture The Flag
HackTheBox – PermX Walkthrough
Before starting any HackTheBox machine there are a few rituals that need to be done i.e. let’s add the IP and Host to the /etc/hosts file and start with the Nmap scan.
Cryptography writeups of all the challenges asked in the VishwaCTF 2022 edition
VishwaCTF’22 Writeups: Forensics
Forensics writeups of all the challenges asked in the VishwaCTF 2022 edition
VishwaCTF’22 writeups: Web
Web writeups of all the challenges asked in the VishwaCTF 2022 edition
Programming & Dev
Understanding the scopes of bean , their life and how to configure them
Complete working of how an IoC container is responsible for dependency injection. Its components and modern-day IOC containers.
Introduction to Spring Framework, Dependency injection and inversion of control along with its advantages and examples.
Detailed steps to setup and configure a web server of your own using AWS instance.(EC2)
News
The new version of WhatsApp
WhatsApp recently rolled out a new multi-device feature for its beta testers that would work on multiple devices even when the phone is not connected to the internet or does not have battery.
Hackers selling 780gb of stolen data from EA( Electronic Arts) which includes source code of FIFA 2021 and FrostBite matchmaking server codes.
The recent Whatsapp and Signal Dispute
The most recent clash between Facebook and Signal due to the ad-campaign run by the latter, led to the deactivation of Signal’s account.
The Algorithm behind Spotify
The major working principle and algorithm behind the working of spotify
Hacking
Have you ever called a friend, or received an SMS, and wondered how does it know where to go? If the answer’s yes, you will have your curiosity cleared (and learn a cool new hacking technique along the way) What is SS7? SS7, or Signalling System No. 7, is an international standard network signaling protocol that allows […]
The right way to send a secret message to anyone, understanding the basics of 3 pass protocol
Major giveaway of a certied penetration testing or hacker training worth Rs.30,000 or $410 on the occasion of our 1 year anniversary. Particiapte now!!
This post is a walkthrough of the PickleRick which is a Rick and Morty themed Tryhackme room. The goal is to find three hidden flags.
Tech Market
Black Friday has become the day of fantastic sales not just across markets, but for the whole community of cybersecurity. It provides an opportunity for individuals and businesses to purchase security tools, certifications, and training programs at ridiculously low prices. Such occasions are meant for small businesses to have something affordable and yet be able […]
The 6 best and the top laptops for any programmer, cybersecurity/hacker, gamer to purchase in 2021. Starting from the lowest to the great budget laptops.Here are all of them
Everything wrapped up from the latest event CES 2021 from intel and AMD. The rivalry and the greatest laptop processor battle launch after the desktop processor battle.
How Nvidia GPUs are purchased using bots to bulk-buy a product, and then put them up for sale on eBay or Amazon for an inflated price which rips off buyer’s eyes out!
How To
Get the latest tech news and updates, ethical hacking tutorials and cybersecurity tips and tricks. Check out MeuSec for more.
Ubuntu is a great and feature-rich linux distro. In this article, you’ll be guided through the steps of Dual Booting Ubuntu along with Windows 10.
The number of ways to trick an AI in an AI proctored exam. These are the most basic limitations of an AI which can never compete with real intelligence of the students.
Hack The Box: How to get the invite code?
To even join Hack The Box, you have to hack your way in or treat it like a CTF challenge by finding the invite code. This article will take you through how to achieve the challenge mentioned. However, I highly recommend that you first try to hack yourself in(on your own) and only use this article as a guide in case you need help.
Networking
Have you ever called a friend, or received an SMS, and wondered how does it know where to go? If the answer’s yes, you will have your curiosity cleared (and learn a cool new hacking technique along the way) What is SS7? SS7, or Signalling System No. 7, is an international standard network signaling protocol that allows […]
The right way to send a secret message to anyone, understanding the basics of 3 pass protocol
VPN vs Proxy
VPN Vs Proxy: Which one is better for you? A VPN and a proxy both will connect you to a remote computer, but that’s where similarities end.
IPv4 vs IPv6: Where did IPv5 go?
Every time you see some network settings, there is IPv4 or IPv6. As you can guess, the previous versions are long in the past (TCP/IP v1,v2, and v3). But why is it IPv4 vs IPv6 instead of the 5th version vs the 6th? How is that the IPv4 from the 80s is still around? Let’s find out!
Linux
Ubuntu is a great and feature-rich linux distro. In this article, you’ll be guided through the steps of Dual Booting Ubuntu along with Windows 10.
When Linux 1.0 was released to the world more than 30 years ago, it’s model of free and open-source software knocked down all of the walls that had previously been put in place by proprietary software giants like Microsoft to maintain control over the development and distribution of computer programs.