Disclaimer This post is dedicated to Ethical Hacking and legal Penetration Testing. All information is for educational use only. Never attempt to use these techniques…
Comments closedCategory: Penetration Testing
Disclaimer This post is dedicated to Ethical Hacking and legal Penetration Testing. All information is for educational use only. Never attempt to use these techniques…
Comments closedIn securing a network, printers and related Internet of Things (IoT) devices are often overlooked, despite its commodity in offices and homes. Printers are seldom…
Comments closedIntroduction Over the past year, I have heard about this new Flipper Zero device. The Flipper Zero was initially announced in 2020 and has recently…
Comments closedWhat is an API? An API (Application Programming Interface) is a set of protocols and definitions that enable third parties to interface with services and…
Comments closedWi-Fi Security Wi-Fi is a family of networking protocols that enable wireless communication and networking for devices. As a result of its popularity, wireless networks…
Comments closedWhat is Active Directory? Active Directory is a proprietary directory service developed by Microsoft. First implemented in Windows 2000 Server, Active Directory was built to…
Comments closed