PrasannaWireshark doo dooo do doo..File Link: https://mercury.picoctf.net/static/ae5b2bc07928fca272ff3900dc9a6cef/shark1.pcapngJun 14Jun 14
PrasannaIntro to IR and IMIncident Response (IR) is a structured approach to handling and managing the aftermath of a security breach or cyberattack. Its primary…Jun 13Jun 13
PrasannaSSDLC (Secure Software Development Life Cycle)The Secure Software Development Lifecycle (SSDL) is a process that integrates security practices into every phase of software development…Jun 12Jun 12
PrasannaSecret of the Polyglot (PICOCTF)Link to file: https://artifacts.picoctf.net/c_titan/7/flag2of2-final.pdfJun 9Jun 9
PrasannaCryptographyCryptography is the practice of securing information by transforming it into a code that only those with the secret key or knowledge can…Jun 9Jun 9
PrasannaDNS Dumpster & Shodan.ioDNSDumpster is an online tool used for DNS reconnaissance, helping to map out a domain’s DNS infrastructure. It gathers information on DNS…Jun 6Jun 6
PrasannaPen-testing FundamentalsA Penetration test or pentest is an ethically-driven attempt to test and analyse the security defences to protect these assets and pieces…Jun 5Jun 5