n00🔑SSRF:SSRF- Server Side Request Forgery is a technique used for subverting the application logic from intended functionality of fetching contents…3 min read·Apr 10, 2024----
n00🔑Android PentestingAndroid Penetration Testing is a systematic process used to identify security vulnerabilities in an Android application. It involves using…7 min read·Mar 31, 2024----
n00🔑WIZ EKS Cluster Games ChallengesCTF Link: https://eksclustergames.com/5 min read·Feb 18, 2024----
n00🔑CI/CD GoatIn today’s fast-paced development environment, understanding and securing Continuous Integration and Continuous Delivery (CI/CD) pipelines…3 min read·Jan 15, 2024----
n00🔑Terraform(IAAC)- VariablesExample- Using a variable for specifying the same “IP address” in different ingress rules.2 min read·Dec 2, 2023----
n00🔑Terraform(IAAC)- Output ValuesExample- Creating a public IP(Elastic IP) and outputting the value of this resource in different ways.2 min read·Dec 2, 2023----
n00🔑IAAC- Cross-referencing attributesExample- creating security group allowing ingress traffic from a specific elastic IP.2 min read·Dec 2, 2023----
n00🔑Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-2LLMNR and NBT-NS Poisoning3 min read·Oct 22, 2023----
n00🔑Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-1smb signing is disabled and version 1 is enabled for some hosts.3 min read·Oct 11, 2023----
n00🔑Installing and Solving Kubegoat in Kubernetes cluster running on VMs.Welcome to this blog post on “Installing Kubegoat in a Kubernetes cluster running on VMs.” In this post, we will walk through the steps of…5 min read·Sep 3, 2023----