Custom Binary Exploitation
In this post, I would like to explore more binary exploitation such as nreport which will improve my skills and knowledge. For a record, the… Read More »Custom Binary Exploitation
In this post, I would like to explore more binary exploitation such as nreport which will improve my skills and knowledge. For a record, the… Read More »Custom Binary Exploitation
I will share my experience on the Cloud Implementation Best Practices which don’t apply to any of my previous, or current organizations. My options would… Read More »Cloud Implementation Best Practice
On this post, I would discuss the Red Teaming activity where some organization will be using those team to test the system or application. For… Read More »Red Teaming Review
What is Lateral Movement attack? For those are not familiar with Lateral Movement attack, it normally an attack that related to cyberattack techniques that used… Read More »Lateral Movement attack Review
I’m sure that most of the people know what Automated Teller Machine (ATM) is and what is used in our daily life. Just for a… Read More »ATM Assessment
Nowadays, a lot of organizations create a Domain Name for their website and internal usage. It considered as important to the organization to ensure the… Read More »Importance of Security in Domain Name
In this post, I would like to share the CyberSecurity Experiences that I gained while exploring those fields such as SOC analyst, Forensic analyst, and… Read More »CyberSecurity Experience
What is Data Breach? Nowadays, there is a lot of Data Breach has been spread throughout the world. Data Breach severity can be considered as… Read More »Data Breach Assessment
Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are… Read More »Cryptography Review
As an organization knows, there will need to active Business Continuity Plan after a disaster occurs. A Business Continuity Plan is important to any organization… Read More »Business Continuity Plan Review