Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    Monthly Archives: January 2020

    1. Home  - 2020  - 
    2. January
    28 Jan, 2020
    Cryptography Review
    Information Security Cryptography, Public Key, Security

    Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are four types of Cryptography key that can be used in daily usage such as Public

    Continue ReadingCryptography Review

    23 Jan, 2020
    Monkey Testing Review
    Application Application, Monkey Testing, Testing

    While I was surfing the internet, I found the terms “Monkey Testing” where it has nothing to do with Penetration Testing. Monkey Testing can be categorized as a software testing technique. Why Monkey Testing? As we all know, Monkey is

    Continue ReadingMonkey Testing Review

    22 Jan, 2020
    PHP Object Injection Vulnerabilities
    Coding Injection, PHP, SQL Injection

    Nowadays, PHP can be considered as one compulsory programming language needed to build up a website for any organization. For Developer point of view, PHP is very easy to code compared with other website programming language. Below are the example

    Continue ReadingPHP Object Injection Vulnerabilities

    21 Jan, 2020
    Penetration Testing with Perl Language
    Coding Penetration Testing, PERL, Programming

    Previously, I have published a post that related to Python Penetration Testing where I will be sharing about Penetration Testing using Perl Language this round. For those who are not familiar with PERL for Penetration Testing, the user will need

    Continue ReadingPenetration Testing with Perl Language

    15 Jan, 2020
    Penetration Testing using Python Code
    Penetration Testing Nmap, Penetration Testing, Python

    Nowadays, programming is considered as a very important element in the industry especially IT. In this post, I would like to share a brief knowledge about Penetration Testing using Python code which can be useful for other people out there.

    Continue ReadingPenetration Testing using Python Code

    5 Jan, 2020
    Gobuster Review Tools
    Application Applciation, Kali Linux, Linux, MacOS, Penetration Testing, Tools

    Introduction and credit Before I start to review the tools, I would like to give credit to OJ Reeves and Christian Mehlmauer for Gobuster tools. Gobuster is been used for Bruteforce Dir, Vhost and DNS of the target’s domain which

    Continue ReadingGobuster Review Tools

    3 Jan, 2020
    Cross-origin resource sharing Review
    Penetration Testing Browser, Masterclass

    Cross-origin resource sharing can be considered as one of the attacks that the website application server vulnerabilities. Normally, it will enable any controlled access to the bug located where it will run the Cross-origin rules such as Access-Cross-Allow-Origin: However, this

    Continue ReadingCross-origin resource sharing Review

    Copyright © 2026 Threatninja.net | Powered by Neom