Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    Category Archives: Masterclass

    1. Home  - 
    2. Archive by category "Masterclass"
    3. ( Page4 )
    3 Jan, 2020
    Cross-origin resource sharing Review
    Penetration Testing Browser, Masterclass

    Cross-origin resource sharing can be considered as one of the attacks that the website application server vulnerabilities. Normally, it will enable any controlled access to the bug located where it will run the Cross-origin rules such as Access-Cross-Allow-Origin: However, this

    Continue ReadingCross-origin resource sharing Review

    24 Dec, 2019
    Cross-Site Scripting Tutorial
    Penetration Testing Browser, Cross Site Scripting

    Cross-site Scripting is an attack where the attacker will enable to insert client-side script into the application to gain access control and data of the application. An example of common Cross-Site Scripting that I do believe everyone is well-aware of

    Continue ReadingCross-Site Scripting Tutorial

    22 Dec, 2019
    Penetration Testing SSL
    Penetration Testing Penetration Testing, Server, SSL

    In this post, I will talk about how to test the SSL vulnerabilities that reside on the system or server. For those who are still new in this area of Security, SSL Vulnerabilities can be categories as below: HeartBleed Poodle

    Continue ReadingPenetration Testing SSL

    9 Sep, 2019
    Business Continuity Plan Review
    Information Security Business Continuity Plan

    As an organization knows, there will need to active Business Continuity Plan after a disaster occurs. A Business Continuity Plan is important to any organization because it has included: Continous delivery of the Business Continuity Plan needs to go through

    Continue ReadingBusiness Continuity Plan Review

    2 Sep, 2019
    SQL Injection Masterclass
    Information Security Masterclass, Server, SQL

    In this post, I would like to take some time to talk on the well-known attack to all people out there. The attack that I mentioned above is SQLi which also known as SQL Injection. What SQL Injection can do

    Continue ReadingSQL Injection Masterclass

    1 Sep, 2019
    Wireshark Masterclass
    Information Security Network, Wireshark

    Wireshark is very popular among Security Professional especially Network Engineer and Pentester. The reason is that Wireshark can be used for Network Packet Analyzer. For those who are not familiar with Network Packet Analyzer, it has been used to capture

    Continue ReadingWireshark Masterclass

    12 Mar, 2018
    XXE Attack Master class
    Penetration Testing

    What is XXE Attack? The XXE Attack(XML External Entity) is an attack where it against an application that will parses XML input. Like other attack, this attack can lead to any expose any of confidential data, Denial of Service, Service

    Continue ReadingXXE Attack Master class

    10 Mar, 2018
    Computer Forensic
    Information Security

    What is Computer Forensic? Computer Forensic is an progress that include a few step like presenvation, identification, extrction, interpretation, and documentation of computer evidence. When all the evidence is computer analyze, it will be provide by an expert opinion during

    Continue ReadingComputer Forensic

    14 Feb, 2018
    Information Gathering Method
    Information Security

    Information gathering is gain any information of an organization or a person . Sometimes, Information Gathering need some “soft skills” and social engineering method. There is a lot of choice of information gathering such as phishing, reconnaissance and social engineering

    Continue ReadingInformation Gathering Method

    29 Jan, 2018
    Penetration Testing Walkthrough
    Penetration Testing

    As most of us know, Penetration Testing will need to follow a few step in order to testing the server and network. Below are the manual that need to be doing during the Penetration Testing activity STEP 1 – RECONNAISSANCE

    Continue ReadingPenetration Testing Walkthrough

    Posts pagination

    1 … 3 4 5
    Copyright © 2026 Threatninja.net | Powered by Neom