Shaik afridHow I Pranked My Friend with TCP Flood Attacks: Window SizeTCPDisclaimer: The blog is only for educational purposes don't misuse it at any cost. If something goes wrong an individual will be…5d ago5d ago
Shaik afridWireshark Analysis: Detecting Suspicious Hidden Text in DocumentsBefore we dive into this topic make sure you have the necessary applications like Wireshark and a bless for a Linx repository, Let us get…Apr 21Apr 21
Shaik afridCDP Flooding attacksThis article is only for educational purposes, Don't grant by misusing at any cost in a production network.Jul 31, 2023Jul 31, 2023
Shaik afridHacking Telnet Credentials using Hydra ToolRefrain from misusing this tool in your production network, It is highly illegal and offensive.Mar 13, 2023Mar 13, 2023
Shaik afridDHCP SnoopingI clarified how we can implement DHCP Starvation attacks in the previous article, This article will be covering the general understanding…Feb 13, 2023Feb 13, 2023
Shaik afridDHCP Starvation AttackNote: This article is only for educational purposes. Never try to misuse a production network at any cost.Feb 11, 2023Feb 11, 2023
Shaik afridPort 139 is that secure in a production network? If not whyBefore we dive into the topics let's understand what is port 139.Sep 13, 2022Sep 13, 2022
Shaik afridExtracting Telnet Credentials of Cisco Router Via Wire-sharkNote:This article is the overview explanation. Don’t grant by misusing in a production network. Article is only for an individuals who are…Aug 29, 2022Aug 29, 2022
Shaik afridWhat is Email Spoofing ?Email Spoofing is a tactic to spoofed an email on behalf of individuals organizations. Reason towards email spoofing to tricks by grabbing…Mar 18, 2022Mar 18, 2022
Shaik afridCSRF attack for beginnersCSRF is an abbreviation for Cross-Site Request Forgery where the attacker induces the user to perform malicious activities in the web…Jan 27, 2022Jan 27, 2022