Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    Category Archives: Masterclass

    1. Home  - 
    2. Archive by category "Masterclass"
    3. ( Page3 )
    1 Sep, 2020
    IoS Security Testing
    Mobile Apple, Mobile, Testing

    Security Testing is a must whenever talking about device especially mobile application. Mobile device such as iOs and APK have run on various of programming language and frameworks where the mobile apps developers will be using for creating applications. An

    Continue ReadingIoS Security Testing

    5 Aug, 2020
    ATM Assessment
    Information Security Cybersecurity, Penetration Testing, Vulnerabilty Assessment

    I’m sure that most of the people know what Automated Teller Machine (ATM) is and what is used in our daily life. Just for a reminder for those are not familiar with ATM, so Automated teller machine (ATM) is an

    Continue ReadingATM Assessment

    1 Aug, 2020
    QRLJACKING and QRLJACKER
    Penetration Testing Cybersecurity, QRLcode, Tools

    In this post, i would like to share one attack method that will take advantage on QR Code which called Quick Response Code Login Jacking (QRLJacking). QRLJacking is a new method that most people might not even heard before. QRLJacking

    Continue ReadingQRLJACKING and QRLJACKER

    6 Jun, 2020
    Importance of Security in Domain Name
    Information Security Cybersecurity, Email Security

    Nowadays, a lot of organizations create a Domain Name for their website and internal usage. It considered as important to the organization to ensure the data is been protected while surfing on the internet. An attacker can disrupt the organization’s

    Continue ReadingImportance of Security in Domain Name

    5 Jun, 2020
    CyberSecurity Experience
    Information Security Career Path, Cybersecurity

    In this post, I would like to share the CyberSecurity Experiences that I gained while exploring those fields such as SOC analyst, Forensic analyst, and Penetration Tester Resource. SOC Analyst I have experience working in one organization as a SOC

    Continue ReadingCyberSecurity Experience

    7 Mar, 2020
    Data Breach Assessment
    Information Security Data, Data Breach, Personal Data

    What is Data Breach? Nowadays, there is a lot of Data Breach has been spread throughout the world. Data Breach severity can be considered as defined but some people will need to remember those context that written in the internet

    Continue ReadingData Breach Assessment

    1 Mar, 2020
    AWS Penetration Testing Review
    Penetration Testing AWS, Cloud, Penetration Testing, Privileges Escalation

    What is AWS Penetration Testing? AWS (Amazon Web Service) Penetration Testing can also be considered as one of the areas that pentester will invest in during Red Team Activities. The finding that might catch the eyes of the attacker would

    Continue ReadingAWS Penetration Testing Review

    1 Feb, 2020
    XML Injection Attack review
    Penetration Testing Masterclass, Penetration Testing, XML Injection

    In this post, I would like to share about XML Injection Attack that might be useful for some scenarios. For those who are not familiar with XML Injection attack, XML Injection is an method that been used by the attacker

    Continue ReadingXML Injection Attack review

    28 Jan, 2020
    Cryptography Review
    Information Security Cryptography, Public Key, Security

    Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are four types of Cryptography key that can be used in daily usage such as Public

    Continue ReadingCryptography Review

    15 Jan, 2020
    Penetration Testing using Python Code
    Penetration Testing Nmap, Penetration Testing, Python

    Nowadays, programming is considered as a very important element in the industry especially IT. In this post, I would like to share a brief knowledge about Penetration Testing using Python code which can be useful for other people out there.

    Continue ReadingPenetration Testing using Python Code

    Posts pagination

    1 2 3 4 5
    Copyright © 2026 Threatninja.net | Powered by Neom