PinnedRavindu ThomasinSystem WeaknessExtracting Saved Passwords from Web Browsermost of the users use web browsers to save their passwords of Facebook, Gmail, and other popular social media as it is very easier and less…2 min read·Aug 8, 2022----
PinnedRavindu ThomasinInfoSec Write-upsCreating a basic backdoor on an android mobileIn this article you’ll be learning the most basic way to hack an android mobile phone using Metasploit framework.3 min read·Aug 9, 2022--1--1
PinnedRavindu ThomasinInfoSec Write-upsES File Explorer Open Port Vulnerability exploitationES File Explorer (File Manager) is a full-featured file (Images, Music, Movies, Documents, app) manager for both local and networked use…4 min read·Aug 7, 2022--1--1
Ravindu ThomasinInfoSec Write-upsLooking for Broken Access Control Vulnerabilities in websitesAccording to OWASP top 10, Broken access control is one of the most exploited vulnerabilities in the web applications resulting countless…7 min read·Oct 23, 2023----
Ravindu ThomasinSLIIT FOSS CommunityA basic way to send ‘Spoofed Emails’When it comes to phishing emails everyone is aware of the “From” address header of email whether if it was came from the original domain…4 min read·Jan 20, 2023----
Ravindu ThomasinSLIIT FOSS CommunityPost Exploitation: Transferring Files Between Linux HostsAfter taking over a PC by exploiting a vulnerability you might wander…3 min read·Aug 14, 2022--1--1
Ravindu ThomasinInfoSec Write-upsHow to Install Elastic Stack on Ubuntu 22.04 LTSWhat is Elastic Stack?4 min read·Jul 28, 2022----
Ravindu ThomasAn overview of a security operation centerA Security Operation Center (SOC) is a centralized function inside an organization that employs people, procedures, and technology to…3 min read·Jul 23, 2022----
Ravindu ThomasEvaluation of Cryptographic Functions and Encryption methodsPrivacy leakage of user data when it comes to online platform is a critical issue in modern era. Those data can be recovered by hackers for…3 min read·Jul 23, 2022----
Ravindu ThomasA Study on Social Media EncryptionBecause no one else, even the service provider, has the ability to decode the data, End to End Encryption(E2EE) is far more secure than…3 min read·Jul 23, 2022----