Shivendra AnandinSystem WeaknessNmap The ultimate Scanning tool*What is it?5 min read·May 10, 2023----
Shivendra AnandinSystem WeaknessEssential Reconnaissance ToolsGHDB (Google Hacking Database)5 min read·May 6, 2023----
Shivendra AnandBharOSJandK Operations is a private company based in IIT Madras that has recently released an open-source project, a new Android-based operating…4 min read·Jan 29, 2023----
Shivendra AnandinSystem WeaknessThe VolatilityVolatility is a powerful tool that allows analysts to extract valuable information from memory dumps of Windows and Linux systems. Memory…5 min read·Jan 27, 2023----
Shivendra AnandinSystem WeaknessThe TOR ForensicsTor forensics is the technique of detecting and analyzing the data sent and received via the Tor network. Tor forensics is concerned with…6 min read·Jan 26, 2023--1--1
Shivendra AnandProxy ServersA proxy server is a computer network service that acts as an intermediary between a client and a server. In other words, it acts as a…2 min read·Dec 8, 2022----
Shivendra AnandinSystem WeaknessDeep Packet InspectionDPI is used for analyzing the encapsulated packet headers and payloads. Different analysis are carried out for different types of payload…1 min read·Nov 27, 2022----
Shivendra AnandFirewall and its typesA firewall is a software or hardware device that enforces security policies, preventing unauthorized access to or from the network. The…2 min read·Nov 27, 2022----