Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    Category Archives: Information Security

    1. Home  - Masterclass
    2. Archive by category "Information Security"
    2 Oct, 2022
    Custom Binary Exploitation
    Information Security Binary Exploitation, Challenges, Cybersecurity, Penetration Testing

    In this post, I would like to explore more binary exploitation such as nreport which will improve my skills and knowledge. For a record, the binary file is coming from OverGraph Machine on Hack the Box Platform. Before we start

    Continue ReadingCustom Binary Exploitation

    19 Jan, 2021
    Cloud Implementation Best Practice
    Information Security Cloud, Cybersecurity

    I will share my experience on the Cloud Implementation Best Practices which don’t apply to any of my previous, or current organizations. My options would be off for certain organizations and individuals. Below are my top 5 Best Practice that

    Continue ReadingCloud Implementation Best Practice

    4 Jan, 2021
    Red Teaming Review
    Information Security Cybersecurity, Red Team

    On this post, I would discuss the Red Teaming activity where some organization will be using those team to test the system or application. For those are not familiar with the terms “Red Teaming”, it s a team which will

    Continue ReadingRed Teaming Review

    12 Dec, 2020
    Lateral Movement attack Review
    Information Security CyberSecurity Risk, Lateral Movement, Review

    What is Lateral Movement attack? For those are not familiar with Lateral Movement attack, it normally an attack that related to cyberattack techniques that used whenever they successfully gain initial access in order to go deeper within the network. The

    Continue ReadingLateral Movement attack Review

    5 Aug, 2020
    ATM Assessment
    Information Security Cybersecurity, Penetration Testing, Vulnerabilty Assessment

    I’m sure that most of the people know what Automated Teller Machine (ATM) is and what is used in our daily life. Just for a reminder for those are not familiar with ATM, so Automated teller machine (ATM) is an

    Continue ReadingATM Assessment

    6 Jun, 2020
    Importance of Security in Domain Name
    Information Security Cybersecurity, Email Security

    Nowadays, a lot of organizations create a Domain Name for their website and internal usage. It considered as important to the organization to ensure the data is been protected while surfing on the internet. An attacker can disrupt the organization’s

    Continue ReadingImportance of Security in Domain Name

    5 Jun, 2020
    CyberSecurity Experience
    Information Security Career Path, Cybersecurity

    In this post, I would like to share the CyberSecurity Experiences that I gained while exploring those fields such as SOC analyst, Forensic analyst, and Penetration Tester Resource. SOC Analyst I have experience working in one organization as a SOC

    Continue ReadingCyberSecurity Experience

    7 Mar, 2020
    Data Breach Assessment
    Information Security Data, Data Breach, Personal Data

    What is Data Breach? Nowadays, there is a lot of Data Breach has been spread throughout the world. Data Breach severity can be considered as defined but some people will need to remember those context that written in the internet

    Continue ReadingData Breach Assessment

    28 Jan, 2020
    Cryptography Review
    Information Security Cryptography, Public Key, Security

    Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are four types of Cryptography key that can be used in daily usage such as Public

    Continue ReadingCryptography Review

    9 Sep, 2019
    Business Continuity Plan Review
    Information Security Business Continuity Plan

    As an organization knows, there will need to active Business Continuity Plan after a disaster occurs. A Business Continuity Plan is important to any organization because it has included: Continous delivery of the Business Continuity Plan needs to go through

    Continue ReadingBusiness Continuity Plan Review

    Posts pagination

    1 2
    Copyright © 2026 Threatninja.net | Powered by Neom