Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    1. Home
    5 Jan, 2020
    Gobuster Review Tools
    Application
    Applciation, Kali Linux, Linux, MacOS, Penetration Testing, Tools

    Introduction and credit Before I start to review the tools, I would like to give credit to OJ Reeves and Christian Mehlmauer for Gobuster tools. Gobuster is been used for Bruteforce Dir, Vhost and DNS of the target’s domain which

    Continue ReadingGobuster Review Tools

    3 Jan, 2020
    Cross-origin resource sharing Review
    Penetration Testing
    Browser, Masterclass

    Cross-origin resource sharing can be considered as one of the attacks that the website application server vulnerabilities. Normally, it will enable any controlled access to the bug located where it will run the Cross-origin rules such as Access-Cross-Allow-Origin: However, this

    Continue ReadingCross-origin resource sharing Review

    24 Dec, 2019
    Cross-Site Scripting Tutorial
    Penetration Testing
    Browser, Cross Site Scripting

    Cross-site Scripting is an attack where the attacker will enable to insert client-side script into the application to gain access control and data of the application. An example of common Cross-Site Scripting that I do believe everyone is well-aware of

    Continue ReadingCross-Site Scripting Tutorial

    22 Dec, 2019
    Penetration Testing SSL
    Penetration Testing
    Penetration Testing, Server, SSL

    In this post, I will talk about how to test the SSL vulnerabilities that reside on the system or server. For those who are still new in this area of Security, SSL Vulnerabilities can be categories as below: HeartBleed Poodle

    Continue ReadingPenetration Testing SSL

    9 Sep, 2019
    Business Continuity Plan Review
    Information Security
    Business Continuity Plan

    As an organization knows, there will need to active Business Continuity Plan after a disaster occurs. A Business Continuity Plan is important to any organization because it has included: Continous delivery of the Business Continuity Plan needs to go through

    Continue ReadingBusiness Continuity Plan Review

    2 Sep, 2019
    SQL Injection Masterclass
    Information Security
    Masterclass, Server, SQL

    In this post, I would like to take some time to talk on the well-known attack to all people out there. The attack that I mentioned above is SQLi which also known as SQL Injection. What SQL Injection can do

    Continue ReadingSQL Injection Masterclass

    1 Sep, 2019
    Wireshark Masterclass
    Information Security
    Network, Wireshark

    Wireshark is very popular among Security Professional especially Network Engineer and Pentester. The reason is that Wireshark can be used for Network Packet Analyzer. For those who are not familiar with Network Packet Analyzer, it has been used to capture

    Continue ReadingWireshark Masterclass

    10 Jun, 2019
    ShellPhish
    Application

    What is Phishing? Phishing is a method that been sent by the spammer to get details or information about the victims such as Name, Bank Account Details, Phone Number and so on. Shellphish is one of the phishing methods that

    Continue ReadingShellPhish

    12 Mar, 2018
    XXE Attack Master class
    Penetration Testing

    What is XXE Attack? The XXE Attack(XML External Entity) is an attack where it against an application that will parses XML input. Like other attack, this attack can lead to any expose any of confidential data, Denial of Service, Service

    Continue ReadingXXE Attack Master class

    10 Mar, 2018
    Computer Forensic
    Information Security

    What is Computer Forensic? Computer Forensic is an progress that include a few step like presenvation, identification, extrction, interpretation, and documentation of computer evidence. When all the evidence is computer analyze, it will be provide by an expert opinion during

    Continue ReadingComputer Forensic

    Posts pagination

    1 … 35 36 37
    Copyright © 2026 Threatninja.net | Powered by Neom