AkashnaiduOWASP Top 10 Vulnerabilities & How to Prevent Them-In 2024The OWASP (Open Web Application Security Project) Top 10 is a regularly updated awareness document focusing on the most critical security…Apr 17Apr 17
AkashnaiduHow to Crack Password Hashes with Hashcat — a Practical GuideHashing is like a strong foundation for keeping things safe in cybersecurity. It’s used to protect stuff like passwords and important…Mar 22Mar 22
AkashnaiduBasic Linux Commands For Beginnner;-Cheet SheetBasic Linux Commands List With ExamplesMar 11Mar 11
AkashnaiduHACKSUDO: THOR VulnHub CTF walkthroughThis is a walkthrough for hacking the vulnerable machine HACKSUDO-THOR Walkthrough. This easy to medium capture-the-flag (CFT) focuses on…Feb 28Feb 28
AkashnaiduBLUEMOON :2021 | Vulnhub Machine WalkthroughThis is a walkthrough for hacking the vulnerable machine BLUEMOON :2021 from VulnHub .BlueMoon is a boot2root CTF challenge available on…Feb 28Feb 28
AkashnaiduKioptrix: Level 1 Walkthrough | VulnhubThis is a walkthrough for hacking the vulnerable machine Kioptrix Level 1 from VulnHub made by Author Kioptrix.The purpose of this virtual…Feb 1Feb 1
AkashnaiduBasic Pentesting -2 CTF walkthrough | vulnhubWalkthrough of the Basic Pentesting series on Basic Pentesting: 2 Vulnhub Machine made by Josiah Pierce. It contains multiple remote…Jan 23Jan 23
AkashnaiduBasic Pentesting -1 Walkthrough | VulnhubThis Walkthrough is on Basic Pentesting: 1 Vulnhub Machine made by Josiah Pierce. It contains multiple remote vulnerabilities and multiple…Jan 19Jan 19