Shivendra AnandPDF HACKINGBefore jumping right into Hacking the PDF File. Let’s Learn about the basic structure of the PDF document.6 min read·6 hours ago----
Shivendra AnandinSystem WeaknessNmap The ultimate Scanning tool*What is it?5 min read·May 10, 2023----
Shivendra AnandinSystem WeaknessEssential Reconnaissance ToolsGHDB (Google Hacking Database)5 min read·May 6, 2023----
Shivendra AnandBharOSJandK Operations is a private company based in IIT Madras that has recently released an open-source project, a new Android-based operating…4 min read·Jan 29, 2023----
Shivendra AnandinSystem WeaknessThe VolatilityVolatility is a powerful tool that allows analysts to extract valuable information from memory dumps of Windows and Linux systems. Memory…5 min read·Jan 27, 2023----
Shivendra AnandinSystem WeaknessThe TOR ForensicsTor forensics is the technique of detecting and analyzing the data sent and received via the Tor network. Tor forensics is concerned with…6 min read·Jan 26, 2023--1--1
Shivendra AnandProxy ServersA proxy server is a computer network service that acts as an intermediary between a client and a server. In other words, it acts as a…2 min read·Dec 8, 2022----
Shivendra AnandinSystem WeaknessDeep Packet InspectionDPI is used for analyzing the encapsulated packet headers and payloads. Different analysis are carried out for different types of payload…1 min read·Nov 27, 2022----