WI-FI ATTACKS (WEP, WPA2, WPA3, Evil Twin)Wireless networks have become an integral part of everyday digital communication, offering flexibility and ease of access. However, this…Jun 30Jun 30
“I Use End-to-End Encryption, They Can’t See My Messages”These days, you’ll often hear someone say, “Don’t worry, it’s all end-to-end encrypted no one can see my messages.” It sounds bulletproof…May 28May 28
Hacking The Home Router (TP-LINK TD-28151N)A few days ago, one evening, I found myself thinking: is my modem actually secure, or is it just pretending to be? So I went digging…May 7May 7
What is NTLM?Windows New Technology LAN Manager (NTLM) is a suite of security protocols offered by Microsoft to authenticate users’ identity and protect…Mar 7Mar 7
What is VLAN Attack? (VLAN hopping)Do you want to know new attack method? Read this write-up!Feb 20Feb 20
How to Find SQL Injection Vulnerabilities: A Comprehensive GuideSQL Injection (SQLi) is a common and potentially devastating web application vulnerability that allows attackers to interfere with the…Jun 22, 2024Jun 22, 2024