Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    1. Home
    7 Mar, 2020
    Data Breach Assessment
    Information Security
    Data, Data Breach, Personal Data

    What is Data Breach? Nowadays, there is a lot of Data Breach has been spread throughout the world. Data Breach severity can be considered as defined but some people will need to remember those context that written in the internet

    Continue ReadingData Breach Assessment

    1 Mar, 2020
    AWS Penetration Testing Review
    Penetration Testing
    AWS, Cloud, Penetration Testing, Privileges Escalation

    What is AWS Penetration Testing? AWS (Amazon Web Service) Penetration Testing can also be considered as one of the areas that pentester will invest in during Red Team Activities. The finding that might catch the eyes of the attacker would

    Continue ReadingAWS Penetration Testing Review

    1 Feb, 2020
    XML Injection Attack review
    Penetration Testing
    Masterclass, Penetration Testing, XML Injection

    In this post, I would like to share about XML Injection Attack that might be useful for some scenarios. For those who are not familiar with XML Injection attack, XML Injection is an method that been used by the attacker

    Continue ReadingXML Injection Attack review

    28 Jan, 2020
    Cryptography Review
    Information Security
    Cryptography, Public Key, Security

    Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are four types of Cryptography key that can be used in daily usage such as Public

    Continue ReadingCryptography Review

    23 Jan, 2020
    Monkey Testing Review
    Application
    Application, Monkey Testing, Testing

    While I was surfing the internet, I found the terms “Monkey Testing” where it has nothing to do with Penetration Testing. Monkey Testing can be categorized as a software testing technique. Why Monkey Testing? As we all know, Monkey is

    Continue ReadingMonkey Testing Review

    22 Jan, 2020
    PHP Object Injection Vulnerabilities
    Coding
    Injection, PHP, SQL Injection

    Nowadays, PHP can be considered as one compulsory programming language needed to build up a website for any organization. For Developer point of view, PHP is very easy to code compared with other website programming language. Below are the example

    Continue ReadingPHP Object Injection Vulnerabilities

    21 Jan, 2020
    Penetration Testing with Perl Language
    Coding
    Penetration Testing, PERL, Programming

    Previously, I have published a post that related to Python Penetration Testing where I will be sharing about Penetration Testing using Perl Language this round. For those who are not familiar with PERL for Penetration Testing, the user will need

    Continue ReadingPenetration Testing with Perl Language

    15 Jan, 2020
    Penetration Testing using Python Code
    Penetration Testing
    Nmap, Penetration Testing, Python

    Nowadays, programming is considered as a very important element in the industry especially IT. In this post, I would like to share a brief knowledge about Penetration Testing using Python code which can be useful for other people out there.

    Continue ReadingPenetration Testing using Python Code

    5 Jan, 2020
    Gobuster Review Tools
    Application
    Applciation, Kali Linux, Linux, MacOS, Penetration Testing, Tools

    Introduction and credit Before I start to review the tools, I would like to give credit to OJ Reeves and Christian Mehlmauer for Gobuster tools. Gobuster is been used for Bruteforce Dir, Vhost and DNS of the target’s domain which

    Continue ReadingGobuster Review Tools

    3 Jan, 2020
    Cross-origin resource sharing Review
    Penetration Testing
    Browser, Masterclass

    Cross-origin resource sharing can be considered as one of the attacks that the website application server vulnerabilities. Normally, it will enable any controlled access to the bug located where it will run the Cross-origin rules such as Access-Cross-Allow-Origin: However, this

    Continue ReadingCross-origin resource sharing Review

    Posts pagination

    1 … 34 35 36 37
    Copyright © 2026 Threatninja.net | Powered by Neom