Skip to content
-
  • facebook
  • Instagram
  • YouTube
  • Tele
FachrezaR Blog FachrezaR Blog
  • Home
    • About Me
    • Contact
  • IT SecurityThe quieter you become, the more you are able to hear.
    • Common
    • Security 101IT Security 101 provides an introduction to the fundamental concepts and practices used to protect systems, networks, and data from cyber threats.
  • SAP WorldSystems, Applications & Products in Data Processing
    • ABAP
      • Library
      • C_ABAPD_2507
        • ABAP core data services and data modeling– Work with the ABAP development environment – Apply basic techniques of ABAP – Create simple object-oriented programs – Use ABAP SQL to access the database – Work with Business Objects and the Entity Manipulation Language – Develop simple applications with the ABAP RESTful Application Programming Model
      • TAW 10
      • TAW 12
  • HobbiesSweet Escape
    • Chess
    • Dota
    • Tennis
  • Home
  • IT Sec Common
  • IT Security
WinPEAS
Posted inIT Security Security 101

WinPEAS

Posted by FachrezaR February 26, 2026
winPEAS is a Windows privilege escalation auditing tool commonly used in cybersecurity assessments. It is…
Continue..
SMBClient
Posted inIT Security Security 101

SMBClient

Posted by FachrezaR February 26, 2026
SMBClient is a command-line tool used to interact with SMB (Server Message Block) network file…
Continue..
Groovy Script
Posted inIT Security Security 101

Groovy Script

Posted by FachrezaR February 25, 2026
Groovy is a dynamic programming language that runs on the Java Virtual Machine (JVM). It…
Continue..
SSTI – Server Side Template Injection
Posted inIT Security Security 101

SSTI – Server Side Template Injection

Posted by FachrezaR February 12, 2026
Server Side Template Injection (SSTI) is a web vulnerability that occurs when a web application…
Continue..
BurpSuite
Posted inIT Security Security 101

BurpSuite

Posted by FachrezaR February 7, 2026
Burp Suite is a powerful web application security testing platform widely used by penetration testers…
Continue..
WinRM
Posted inIT Security Security 101

WinRM

Posted by FachrezaR January 30, 2026
WinRM (Windows Remote Management) is a Microsoft implementation of the WS-Management protocol used for remote…
Continue..
John The Ripper
Posted inIT Security Security 101

John The Ripper

Posted by FachrezaR January 30, 2026
John the Ripper, often called John, is a popular password security auditing tool used in…
Continue..
NTLM
Posted inIT Security Security 101

NTLM

Posted by FachrezaR January 30, 2026
NTLM (NT LAN Manager) is an authentication protocol developed by Microsoft for verifying user identities…
Continue..
PORTS
Posted inCommon IT Security

PORTS

Posted by FachrezaR January 20, 2026
Ports are logical endpoints used in computer networks to manage different types of communication. They…
Continue..
WireShark
Posted inIT Security Security 101

WireShark

Posted by FachrezaR January 20, 2026
Wireshark is a widely used network protocol analyzer designed to capture and inspect network traffic.…
Continue..

Posts pagination

1 2 3 Next page
Categories

Recent Posts

  • HR Function Module Library
  • WinPEAS
  • SMBClient
  • Groovy Script
  • SSTI – Server Side Template Injection

Recent Comments

  1. FachrezaR on Unit 1 – Getting Started
  2. https://www.billighemsidafretag.se/ on Unit 1 – Getting Started
  3. FachrezaR on 👋 Hello World
  4. G on 👋 Hello World
  5. A WordPress Commenter on 👋 Hello World

Archives

  • April 2026
  • February 2026
  • January 2026
  • October 2025
when you have eliminated the impossible, whatever remains, however improbable, must be the truth?
- The Sign of the Four, ch. 6 (1890) Sherlock Holmes in The Sign of the Four (Doubleday p. 111)
© 2026 FachrezaR Blog
Copyright 2026 — FachrezaR Blog. All rights reserved. Bloghash WordPress Theme
Scroll to Top

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by