Radare2 – Reverse Engineering Tools

For those who have experience in with Reverse Engineering Method, they should be familiar with Radare2 Tools where it will provide a set of libraries and also work with binary files. Radare2 or also known […]

Oracle Security Patch Update

A few days ago, Oracle Security Patch Update has been released for this month. On the latest security patch, they have released about 334 security patch this year where it matches the amount that they […]

Secure over the Network

Nowadays, most everyone uses the internet for personal and business users over the network device (Router/Switch). However, the organization only do some protection on their server and system where they ignore the network protection. A […]

CVE-2020-0601 Vulnerabilities

First CVE in the year 2020 has been released to the public and one of them is CVE-2020-0601 which it refers to Windows CryptoAPI Vulnerabilities in Microsoft Windows. Before we go deep into the vulnerabilities, […]

Penetration Testing using Python Code

Nowadays, programming is considered as a very important element in the industry especially IT. In this post, I would like to share a brief knowledge about Penetration Testing using Python code which can be useful […]

Network Security Assessment tools

As we know, Network Security can be considered as one of the assessment when doing Penetration Testing. Another name of Network Security Assessment is called Vulnerability Assessment(VA). The Assessment should be completed within the network […]

Password Security

Nowadays, the user has to be careful when choosing the password for any system or device to avoid. I would advise that the user need to be putting a strong password which contains requirement such […]

Wfuzz review

Wfuzz is an alternative tools for Gobuster and Dirbuster where it will look on the hidden files such as directory and data within the server itself. Unlike Gobuster and Dirbuster, Wfuzz cannot save the result […]

Lack of CyberSecurity Resource

Source: Welcome: Solving Our Cybersecurity Talent Shortage Over the years, we notice that IT Security resources have been a lack in most of the organizations where it has been critical to any infrastructure and any […]

OS fingerprint method

During Penetration Testing phrase, A pentester will test the Operating System for verification usage. The method can be used for this activity such as Nmap and TTL response where it will provide details of the […]