Harshaun SinghCYBER KILL CHAIN METHODOLOGYThe mantra of any good security engineer is ‘Security is not a product but a process.It’s more then designing strong cryptography into the…Sep 6, 2018Sep 6, 2018
Harshaun SinghHack The Machine WAKANDA BY- TURBANED SECUR!TYHello Guys..Today i would be undertaking another CTF Challenge named WAKANDA available on Vulnhub. Though the machine name immediately…Sep 5, 2018Sep 5, 2018
Harshaun SinghHack The Machine-Toppo by #Turbaned SecuritySo Today’s machine is a beginners level available on Vulnhub and designed by Author: Hadi Mene .This is a beginner level machine not much…Sep 3, 2018Sep 3, 2018
Harshaun SinghHack The Machine-Lampião by #Turbaned SecurityThis is my first CTF Writeup.I would try to be as short as possible and would provide relevant info related to this machine and necessary…Aug 30, 2018Aug 30, 2018
Harshaun SinghWindows Privileged Escalation-Manual and using Metasploit framework-Ch.1During a initial phase of a pentest or during an authenticated scan you must have come across a vulnerability known as Microsoft Windows…Jul 29, 2018Jul 29, 2018
Harshaun SinghPhishing-Single Biggest ThreatHave you or any of your client have received a suspicious,phishing , scam or a malicious email.The answer would be YES .Today no matter who…Jul 26, 2018Jul 26, 2018