Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    1. Home
    12 Dec, 2020
    Lateral Movement attack Review
    Information Security
    CyberSecurity Risk, Lateral Movement, Review

    What is Lateral Movement attack? For those are not familiar with Lateral Movement attack, it normally an attack that related to cyberattack techniques that used whenever they successfully gain initial access in order to go deeper within the network. The

    Continue ReadingLateral Movement attack Review

    11 Dec, 2020
    TryHackMe: Advent of Cyber 2 – Day 1
    TryHackMe
    Information Security, Penetration Testing, TryHackMe

    In this post, I would like to share some technical areas that I have to try on TryHackMe website. I’m also still learning about CyberSecurity stuff and it’s a lot website learn and power up your skills. I want to

    Continue ReadingTryHackMe: Advent of Cyber 2 – Day 1

    4 Oct, 2020
    Database Penetration Testing
    Penetration Testing
    Database, Oracle, Penetration Testing

    In this post, I would like to share knowledge and experience while doing Database Penetration Testing. The purpose of Penetration Testing is to find vulnerabilities within the system and simulate the controlled environment if there is any cybersecurity attack which

    Continue ReadingDatabase Penetration Testing

    27 Sep, 2020
    Android Banking New Trojan
    Mobile
    Android, Information Security, Trojan; Mobile

    Recently, a trojan called Alien which is a new ‘fork’ of Cerberus Banking Trojan that normally targets victim’s credentials from more than 200 mobile applications includes Bank of America and Microsoft Outlook. Alien Trojan has been detected active since early

    Continue ReadingAndroid Banking New Trojan

    1 Sep, 2020
    IoS Security Testing
    Mobile
    Apple, Mobile, Testing

    Security Testing is a must whenever talking about device especially mobile application. Mobile device such as iOs and APK have run on various of programming language and frameworks where the mobile apps developers will be using for creating applications. An

    Continue ReadingIoS Security Testing

    5 Aug, 2020
    ATM Assessment
    Information Security
    Cybersecurity, Penetration Testing, Vulnerabilty Assessment

    I’m sure that most of the people know what Automated Teller Machine (ATM) is and what is used in our daily life. Just for a reminder for those are not familiar with ATM, so Automated teller machine (ATM) is an

    Continue ReadingATM Assessment

    1 Aug, 2020
    QRLJACKING and QRLJACKER
    Penetration Testing
    Cybersecurity, QRLcode, Tools

    In this post, i would like to share one attack method that will take advantage on QR Code which called Quick Response Code Login Jacking (QRLJacking). QRLJacking is a new method that most people might not even heard before. QRLJacking

    Continue ReadingQRLJACKING and QRLJACKER

    6 Jun, 2020
    Importance of Security in Domain Name
    Information Security
    Cybersecurity, Email Security

    Nowadays, a lot of organizations create a Domain Name for their website and internal usage. It considered as important to the organization to ensure the data is been protected while surfing on the internet. An attacker can disrupt the organization’s

    Continue ReadingImportance of Security in Domain Name

    6 Jun, 2020
    Vulnerabilities that been published within 4 years ago
    Vulnerabilities
    Bug, Malware, Vulnerabilities

    For the past three years, a lot of vulnerabilities have been published in the security advisory to alert the user about the vulnerabilities. From the advisory that been listed, the following list of the vulnerabilities has been generated headlines among

    Continue ReadingVulnerabilities that been published within 4 years ago

    5 Jun, 2020
    CyberSecurity Experience
    Information Security
    Career Path, Cybersecurity

    In this post, I would like to share the CyberSecurity Experiences that I gained while exploring those fields such as SOC analyst, Forensic analyst, and Penetration Tester Resource. SOC Analyst I have experience working in one organization as a SOC

    Continue ReadingCyberSecurity Experience

    Posts pagination

    1 … 33 34 35 … 37
    Copyright © 2026 Threatninja.net | Powered by Neom