Sathish ShanCovering our TracksHi, Today we going to see about “Covering our Tracks” on Linux after pen-test.Dec 12, 2020Dec 12, 2020
Sathish ShanProcess Command ps aux | TTY and STAT ExplainedWhat does ‘?’ represent under TTY under process ps command?Dec 11, 2020Dec 11, 2020
Sathish ShanHow to Crack Linux Password HashExample of Linux Hash: $1$e7NfNpNi$A6nCwOTqrNR2oDuIKirRZApr 14, 2020Apr 14, 2020
Sathish ShanDecompile and Recompile Android APKI had the need to take an existing Android APK, tweak it, and rebuild. This is not too difficult, but I did have to download the tools…Jan 22, 20202Jan 22, 20202
Sathish ShanBurp intruder attack typesBurp is an intercepting proxy that can be used to test web sites. It has a fuzzing feature called intruder that can replace parameters in…Jan 4, 2020Jan 4, 2020
Sathish ShanHow many types of SQL injections are there?Types of SQL InjectionNov 25, 2019Nov 25, 2019
Sathish ShanAccessing Remote Database Server from Local MYSQL ClientIn my Previous article about accessing remote database server from local PhpMyAdmin. here it is.Oct 2, 2019Oct 2, 2019
Sathish ShanThe Gentle Linux RebootFrozen Linux System is used to recover from Freezes, or to Reboot a computer without corrupting the Filesystem. It is restarted more…Oct 2, 2019Oct 2, 2019