PinnedCyberObitoElevated Cybersecurity: Deploying Honeypots with T-Pot on Azure CloudIn the vast expanse of the digital landscape, where every click and keystroke can usher in a potential threat, cybersecurity professionals…Aug 22, 2023Aug 22, 2023
PinnedCyberObitoCreating an EC2 Instance Using AWS CLI.In this blog I will guide you to use AWS CLI to create an EC2 instance. Also, we will look at all the possible options available in the…Nov 24, 2023Nov 24, 2023
CyberObitoHow I Passed the CEH Practical with 18/20: My Exam Experience and TipsPersonal ContextJul 4Jul 4
CyberObitoEthical Hacker’s Playbook: Supercharging Your Approach to Ethical HackingIn this blog, I want to chat about my approach to ethical hacking. I’ll be sharing what I’ve learned, my thoughts, and the basic steps I…Nov 17, 20231Nov 17, 20231
CyberObitoEvil QR — Unmasking the Phishing Threat in QR CodesEvil QR — Phishing With QR CodesNov 6, 2023Nov 6, 2023
CyberObito🚀 Launch Your Cybersecurity Career with TryHackMe’s New Security Engineer Learning Path! 🔒*Introduction**Sep 12, 2023Sep 12, 2023
CyberObitoProtect Yourself from the Rising Threat of Fake E-Challan Scams: A Cyber Security Awareness BlogIntroduction: The Growing Threat of Fake E-Challan Scams in IndiaAug 30, 2023Aug 30, 2023
CyberObitoExploring Vulnerabilities: A Deep Dive into my Vulnerability Assessment Lab ProjectGOALAug 14, 2023Aug 14, 2023
CyberObitoIn this article we are going to explore a Web-Enumeration tool called Gobuster.We are going to see some advantages Gobuster has over other similar tools like dirbuster and we are also going to explore its features and…Jul 15, 2023Jul 15, 2023
CyberObitoJohn the Ripper Unplugged: Understanding its Capabilities and LimitationsWelcome to my blog, fellow cybersecurity enthusiasts! I’m Cyberobito, and today we’re diving into the fascinating world of password…Jul 2, 2023Jul 2, 2023