Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    Yearly Archives: 2018

    1. Home  - 
    2. 2018
    12 Mar, 2018
    XXE Attack Master class
    Penetration Testing

    What is XXE Attack? The XXE Attack(XML External Entity) is an attack where it against an application that will parses XML input. Like other attack, this attack can lead to any expose any of confidential data, Denial of Service, Service

    Continue ReadingXXE Attack Master class

    10 Mar, 2018
    Computer Forensic
    Information Security

    What is Computer Forensic? Computer Forensic is an progress that include a few step like presenvation, identification, extrction, interpretation, and documentation of computer evidence. When all the evidence is computer analyze, it will be provide by an expert opinion during

    Continue ReadingComputer Forensic

    1 Mar, 2018
    CryptoJacking
    News

    Cryptojacking is a new terms that means as a secret use of your computing device to mine cryptocurrency where it normally used on the purpose of be confined to the victim without their awareness. The function of it is to

    Continue ReadingCryptoJacking

    14 Feb, 2018
    Information Gathering Method
    Information Security

    Information gathering is gain any information of an organization or a person . Sometimes, Information Gathering need some “soft skills” and social engineering method. There is a lot of choice of information gathering such as phishing, reconnaissance and social engineering

    Continue ReadingInformation Gathering Method

    29 Jan, 2018
    Penetration Testing Walkthrough
    Penetration Testing

    As most of us know, Penetration Testing will need to follow a few step in order to testing the server and network. Below are the manual that need to be doing during the Penetration Testing activity STEP 1 – RECONNAISSANCE

    Continue ReadingPenetration Testing Walkthrough

    22 Jan, 2018
    Wireless Penetration Testing Masterclass
    Information Security

    What is Wireless Penetration Testing? Nowadays, Wireless Penetration Testing can be considered as one of the main testing for any organization. When we talk about Wireless, it can be dangerous because of the attacker can easily sniffer any traffic where

    Continue ReadingWireless Penetration Testing Masterclass

    11 Jan, 2018
    IOT Penetration Testing
    Penetration Testing

    What is IOT Penetration Testing? The IOT Penetration Testing is more like checking the vulnerabilities of the IOT device which it can consider as checking for any weakness on the IOT Device The advantages of IoT penetration testing is that

    Continue ReadingIOT Penetration Testing

    Copyright © 2026 Threatninja.net | Powered by Neom