Raj Kumar MGrafana Under Attack: A Study of Recent Vulnerabilities and Exploits CVE-2021–43798Grafana is an open-source platform for monitoring, visualization, and analysis. It is widely used to create interactive and customizable…Jul 3Jul 3
Raj Kumar MA Deep Dive into WSUS Security RisksWSUS(Windows Server Update Service) works like a central hub where all the updates from Microsoft are downloaded once and stored. Then…Jul 2Jul 2
Raj Kumar MSecurity Headers Uncovered: Protecting Your Web AssetsSecurity headers are one way to protect your web application. While they don’t provide complete protection, they are an important security…Jun 21Jun 21
Raj Kumar MMastering Network Security with Nessus: A Comprehensive Guide — Part 1Nessus is a powerful tool that helps organizations find and fix security weaknesses in their computer systems and networks. Imagine your…Jun 16Jun 16
Raj Kumar MMicrosoft Outlook RCE CVE-2024–21413 (Moniker Link)The recent vulnerability called Monikerlink affects Microsoft Outlook products. It allows attackers to bypass a security feature called…May 9May 9
Raj Kumar MGodPotato: Empowering Windows Privilege Escalation TechniquesTo perform privilege escalation, we first need to obtain user access. Then, we must check whether the user has the necessary permissions…Apr 161Apr 161
Raj Kumar MSecurity Breach Alert: Safeguarding Against VM2 Library VulnerabilitiesLet’s start with an Nmap scan.Apr 14Apr 14
Raj Kumar MExploring Impacket DCOMEXEC: Enhancing Active Directory Attack CapabilitiesThe Impacket-DCOMEXEC tool supports you during Active Directory-related attacks.Apr 6Apr 6
Raj Kumar MExploring Network Scanning Automation with Bash and NmapHi everyone this Bash script is designed to perform various types of Nmap scans (TCP scan, UDP scan, Version scan, Version scan with port…Apr 5Apr 5
Raj Kumar MHackthebox | TwoMillion(Easy)Hey everyone! Ready to hop on board the Easy Machine train? Let’s explore this cool Linux-powered gadget together and learn some awesome…Mar 21Mar 21