Kali Linux 2020 is out!

Within a few days ago, Kali Linux 2020.1 have been released in the wild. For those that wanted to install from zero, they can download and install it from the link here New features and […]

Cryptography Review

Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are four types of Cryptography key that can be used in […]

Monkey Testing Review

While I was surfing the internet, I found the terms “Monkey Testing” where it has nothing to do with Penetration Testing. Monkey Testing can be categorized as a software testing technique. Why Monkey Testing? As […]

PHP Object Injection Vulnerabilities

Nowadays, PHP can be considered as one compulsory programming language needed to build up a website for any organization. For Developer point of view, PHP is very easy to code compared with other website programming […]

Penetration Testing with Perl Language

Previously, I have published a post that related to Python Penetration Testing where I will be sharing about Penetration Testing using Perl Language this round. For those who are not familiar with PERL for Penetration […]

Internet Explorer security flaw in the Wild

Within this few days, people have aware of the Internet Explorer(IE) been reported a serious flaw been found and Microsoft has confirmed the flaw. IE is not the only browser that been having a flaw […]

Radare2 – Reverse Engineering Tools

For those who have experience in with Reverse Engineering Method, they should be familiar with Radare2 Tools where it will provide a set of libraries and also work with binary files. Radare2 or also known […]

Oracle Security Patch Update

A few days ago, Oracle Security Patch Update has been released for this month. On the latest security patch, they have released about 334 security patch this year where it matches the amount that they […]

Secure over the Network

Nowadays, most everyone uses the internet for personal and business users over the network device (Router/Switch). However, the organization only do some protection on their server and system where they ignore the network protection. A […]

CVE-2020-0601 Vulnerabilities

First CVE in the year 2020 has been released to the public and one of them is CVE-2020-0601 which it refers to Windows CryptoAPI Vulnerabilities in Microsoft Windows. Before we go deep into the vulnerabilities, […]