Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    1. Home
    6 Jun, 2020
    Importance of Security in Domain Name
    Information Security
    Cybersecurity, Email Security

    Nowadays, a lot of organizations create a Domain Name for their website and internal usage. It considered as important to the organization to ensure the data is been protected while surfing on the internet. An attacker can disrupt the organization’s

    Continue ReadingImportance of Security in Domain Name

    6 Jun, 2020
    Vulnerabilities that been published within 4 years ago
    Vulnerabilities
    Bug, Malware, Vulnerabilities

    For the past three years, a lot of vulnerabilities have been published in the security advisory to alert the user about the vulnerabilities. From the advisory that been listed, the following list of the vulnerabilities has been generated headlines among

    Continue ReadingVulnerabilities that been published within 4 years ago

    5 Jun, 2020
    CyberSecurity Experience
    Information Security
    Career Path, Cybersecurity

    In this post, I would like to share the CyberSecurity Experiences that I gained while exploring those fields such as SOC analyst, Forensic analyst, and Penetration Tester Resource. SOC Analyst I have experience working in one organization as a SOC

    Continue ReadingCyberSecurity Experience

    7 Mar, 2020
    Data Breach Assessment
    Information Security
    Data, Data Breach, Personal Data

    What is Data Breach? Nowadays, there is a lot of Data Breach has been spread throughout the world. Data Breach severity can be considered as defined but some people will need to remember those context that written in the internet

    Continue ReadingData Breach Assessment

    1 Mar, 2020
    AWS Penetration Testing Review
    Penetration Testing
    AWS, Cloud, Penetration Testing, Privileges Escalation

    What is AWS Penetration Testing? AWS (Amazon Web Service) Penetration Testing can also be considered as one of the areas that pentester will invest in during Red Team Activities. The finding that might catch the eyes of the attacker would

    Continue ReadingAWS Penetration Testing Review

    1 Feb, 2020
    XML Injection Attack review
    Penetration Testing
    Masterclass, Penetration Testing, XML Injection

    In this post, I would like to share about XML Injection Attack that might be useful for some scenarios. For those who are not familiar with XML Injection attack, XML Injection is an method that been used by the attacker

    Continue ReadingXML Injection Attack review

    28 Jan, 2020
    Cryptography Review
    Information Security
    Cryptography, Public Key, Security

    Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are four types of Cryptography key that can be used in daily usage such as Public

    Continue ReadingCryptography Review

    23 Jan, 2020
    Monkey Testing Review
    Application
    Application, Monkey Testing, Testing

    While I was surfing the internet, I found the terms “Monkey Testing” where it has nothing to do with Penetration Testing. Monkey Testing can be categorized as a software testing technique. Why Monkey Testing? As we all know, Monkey is

    Continue ReadingMonkey Testing Review

    22 Jan, 2020
    PHP Object Injection Vulnerabilities
    Coding
    Injection, PHP, SQL Injection

    Nowadays, PHP can be considered as one compulsory programming language needed to build up a website for any organization. For Developer point of view, PHP is very easy to code compared with other website programming language. Below are the example

    Continue ReadingPHP Object Injection Vulnerabilities

    21 Jan, 2020
    Penetration Testing with Perl Language
    Coding
    Penetration Testing, PERL, Programming

    Previously, I have published a post that related to Python Penetration Testing where I will be sharing about Penetration Testing using Perl Language this round. For those who are not familiar with PERL for Penetration Testing, the user will need

    Continue ReadingPenetration Testing with Perl Language

    Posts pagination

    1 … 34 35 36 37
    Copyright © 2026 Threatninja.net | Powered by Neom