Published inSystem WeaknessHow to assess the Vulnerabilities, Threats, and RisksA vulnerability is a flaw in an asset’s design, implementation, operation, or management that can be exploited by a threat agent. A threat…Dec 8, 2024Dec 8, 2024
Published inSystem WeaknessExecution of a clickjacking attack on Gemini (Google’s AI-powered assistant) - which I recently…Opened the target URL in a web browser.Dec 1, 20241Dec 1, 20241
How to install Parrot in VirtualBox on your Windows MachineDownload the latest version of Microsoft Visual C++ Redistributable from…Oct 19, 2024Oct 19, 2024
How to install Kali Linux in VirtualBox on your Windows MachineDownload the latest version of Microsoft Visual C++ Redistributable from…Oct 19, 2024Oct 19, 2024
How to check the Brute Force Vulnerability on a Login Page for a web-applicationSteps to download and install the burp suite:Oct 13, 2022Oct 13, 2022
How to configure the iOS Mobile Device to work with Burp SuiteSteps for configuring the Network connectivity:Apr 24, 2022Apr 24, 2022
How to install and work on the NTLM-Recon in the Parrot OSA fast and flexible NTLM reconnaissance tool without external dependencies. Useful to find out information about NTLM endpoints when…Feb 27, 2022Feb 27, 2022
How to configure the Android Mobile Device with BurpSuite to capture the traffic of the Android APKSteps for configuring the Network connectivity:Feb 5, 2022Feb 5, 2022
How to install the web vulnerability-lab in the Kali LinuxListed vulnerabilities in this project:Jan 27, 2022Jan 27, 2022