Skip to content
-
  • facebook
  • Instagram
  • YouTube
  • Tele
FachrezaR Blog FachrezaR Blog
  • Home
    • About Me
    • Contact
  • IT SecurityThe quieter you become, the more you are able to hear.
    • Common
    • Security 101IT Security 101 provides an introduction to the fundamental concepts and practices used to protect systems, networks, and data from cyber threats.
  • SAP WorldSystems, Applications & Products in Data Processing
    • ABAP
      • Library
      • C_ABAPD_2507
        • ABAP core data services and data modeling– Work with the ABAP development environment – Apply basic techniques of ABAP – Create simple object-oriented programs – Use ABAP SQL to access the database – Work with Business Objects and the Entity Manipulation Language – Develop simple applications with the ABAP RESTful Application Programming Model
      • TAW 10
      • TAW 12
  • HobbiesSweet Escape
    • Chess
    • Dota
    • Tennis
  • Home
  • IT Sec Common
  • Ethical Hacking
WinPEAS
Posted inIT Security Security 101

WinPEAS

Posted by FachrezaR February 26, 2026
winPEAS is a Windows privilege escalation auditing tool commonly used in cybersecurity assessments. It is…
Continue..
SMBClient
Posted inIT Security Security 101

SMBClient

Posted by FachrezaR February 26, 2026
SMBClient is a command-line tool used to interact with SMB (Server Message Block) network file…
Continue..
SSTI – Server Side Template Injection
Posted inIT Security Security 101

SSTI – Server Side Template Injection

Posted by FachrezaR February 12, 2026
Server Side Template Injection (SSTI) is a web vulnerability that occurs when a web application…
Continue..
BurpSuite
Posted inIT Security Security 101

BurpSuite

Posted by FachrezaR February 7, 2026
Burp Suite is a powerful web application security testing platform widely used by penetration testers…
Continue..
John The Ripper
Posted inIT Security Security 101

John The Ripper

Posted by FachrezaR January 30, 2026
John the Ripper, often called John, is a popular password security auditing tool used in…
Continue..
NTLM
Posted inIT Security Security 101

NTLM

Posted by FachrezaR January 30, 2026
NTLM (NT LAN Manager) is an authentication protocol developed by Microsoft for verifying user identities…
Continue..
MYSQL
Posted inIT Security Security 101 Uncategorized

MYSQL

Posted by FachrezaR January 20, 2026
MySQL is a widely used open-source relational database management system. It stores data in structured…
Continue..
NMAP – Basic Security
Posted inIT Security Security 101

NMAP – Basic Security

Posted by FachrezaR January 16, 2026
Nmap (Network Mapper) is a powerful network scanning and security assessment tool widely used by…
Continue..
Categories

Recent Posts

  • HR Function Module Library
  • WinPEAS
  • SMBClient
  • Groovy Script
  • SSTI – Server Side Template Injection

Recent Comments

  1. FachrezaR on Unit 1 – Getting Started
  2. https://www.billighemsidafretag.se/ on Unit 1 – Getting Started
  3. FachrezaR on 👋 Hello World
  4. G on 👋 Hello World
  5. A WordPress Commenter on 👋 Hello World

Archives

  • April 2026
  • February 2026
  • January 2026
  • October 2025
when you have eliminated the impossible, whatever remains, however improbable, must be the truth?
- The Sign of the Four, ch. 6 (1890) Sherlock Holmes in The Sign of the Four (Doubleday p. 111)
© 2026 FachrezaR Blog
Copyright 2026 — FachrezaR Blog. All rights reserved. Bloghash WordPress Theme
Scroll to Top

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by