Posted inIT Security Security 101 WinPEAS Posted by FachrezaR February 26, 2026 winPEAS is a Windows privilege escalation auditing tool commonly used in cybersecurity assessments. It is…
Posted inIT Security Security 101 SMBClient Posted by FachrezaR February 26, 2026 SMBClient is a command-line tool used to interact with SMB (Server Message Block) network file…
Posted inIT Security Security 101 Groovy Script Posted by FachrezaR February 25, 2026 Groovy is a dynamic programming language that runs on the Java Virtual Machine (JVM). It…
Posted inIT Security Security 101 SSTI – Server Side Template Injection Posted by FachrezaR February 12, 2026 Server Side Template Injection (SSTI) is a web vulnerability that occurs when a web application…
Posted inIT Security Security 101 BurpSuite Posted by FachrezaR February 7, 2026 Burp Suite is a powerful web application security testing platform widely used by penetration testers…
Posted inIT Security Security 101 WinRM Posted by FachrezaR January 30, 2026 WinRM (Windows Remote Management) is a Microsoft implementation of the WS-Management protocol used for remote…
Posted inIT Security Security 101 John The Ripper Posted by FachrezaR January 30, 2026 John the Ripper, often called John, is a popular password security auditing tool used in…
Posted inIT Security Security 101 NTLM Posted by FachrezaR January 30, 2026 NTLM (NT LAN Manager) is an authentication protocol developed by Microsoft for verifying user identities…
Posted inCommon IT Security PORTS Posted by FachrezaR January 20, 2026 Ports are logical endpoints used in computer networks to manage different types of communication. They…
Posted inIT Security Security 101 WireShark Posted by FachrezaR January 20, 2026 Wireshark is a widely used network protocol analyzer designed to capture and inspect network traffic.…