Vishnu Shivalal PTyposquatting / URL HijackingTyposquatting, a.k.a. URL Hijacking is a social engineering method that uses misspelt domains for various malicious or illegal activities…Jun 21Jun 21
Vishnu Shivalal PJangow VulnHub CTF WalkthroughThe Jangow: 1.0.1 is a linux machine (virtual OVA format). This machine was released on November 4th, 2021 and the developer of this…Feb 17Feb 17
Vishnu Shivalal PSTRIDE SECURITY THREAT MODELThe STRIDE is a security threat model which was introduced in 1999 by Praerit Garg and Loren Kohnfelder (Microsoft security researchers)…Dec 5, 2023Dec 5, 2023
Vishnu Shivalal PTOOLS FOR CYBER THREAT HUNTING (PART - IV)I know this Cyber Threat Intelligence franchise has becoming too lengthy. Well what can I say, tools aren’t enough for Cyber Security…Nov 29, 2023Nov 29, 2023
Vishnu Shivalal PTOOLS FOR CYBER THREAT HUNTING (PART - III)This is a third part to the TOOLS FOR CYBER THREAT HUNTING (PART - II).Nov 10, 2023Nov 10, 2023
Vishnu Shivalal PTOOLS FOR CYBER THREAT HUNTING (PART - II)This is a sequel part to the TOOLS FOR CYBER THREAT HUNTING (PART — I).Oct 16, 2023Oct 16, 2023
Vishnu Shivalal PTOOLS FOR CYBER THREAT HUNTING (PART - I)Cyber Threat HuntingAug 23, 2023Aug 23, 2023
Vishnu Shivalal PMy Cyber Security Road MapCyber security is a vast stream which doesn’t have a correct route to follow or that’s what I believe. Learning Computer basics…Jun 12, 2023Jun 12, 2023
Vishnu Shivalal PCommon Password AttacksPassword is a secret key to authorize or authenticate a user. With the help of username and password, users can confirm their identity and…May 25, 2023May 25, 2023
Vishnu Shivalal PIT Security VS Information Security VS Cyber SecurityThe IT security, information security and the cyber security are all related to the protection of information and systems. But these three…Apr 21, 2023Apr 21, 2023