Category: Uncategorized
-
Canary tokens on AWS
Written by
on
What are Canary tokens? Canary tokens is simple way to detect attacker in your environment. Canary tokens provides visibility and able to identify how far the attacker penetrated the network. And also, sometimes it can be used to test your defence system. In the blog post, I am going to show how easy to deploy…
-
Countdown to zero day by Kim Zetter
Written by
on
Introduction This is my first cyber security book I read and I got hooked into the story from page1 and its real page turner. I am fascinated and amazed at the same time how the digital weapon meets the kinetic warfare. Two decades ago it’s impossible to think someone said they uses computer to sabotage…
-
Offensive Security
Written by
on
What is Offensive Security? Recently I have developed interest in learning how bad actors exploiting the Information System and so I started spending most of my time understanding, practicing and identifying the vulnerable components in the application (Ethical way) to enhance my knowledge so that it will be useful to securely implement and protect the…
-
Log4J Experiment
Written by
on
Introduction Log4J is popular topic recently – Most of the apps are vulnerable for Log4J vulnerability. Below is my experiment locally exploiting the Log4J vulnerability. Vulnerable Code Reference – https://www.lunasec.io/docs/blog/log4j-zero-day/ Compile the vulnerable code and get it ready to execute Run the exploitable code using below docker command Change the IP address to your local IP…
-
Hello world!
Written by
on
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!