PinnedPublished inInfoSec Write-upsBehind the Screens: Exploring a Fresh Phishing Campaign in Indonesia Stealing Facebook CredentialsOver the weekend, while leisurely browsing the internet, I came across a unique and suspicious link designed specifically for an Indonesian…Oct 2, 2023Oct 2, 2023
PinnedPublished inInfoSec Write-upsDomain Name System 0x1 | DNS 101Hey techies, you’ve come to the right place if you’re looking to learn about or refresh your knowledge of DNS. We will be providing a…Jan 14, 2023Jan 14, 2023
Published inInfoSec Write-upsHow to Route all your traffics through TOR in Kali Linux May be Linux Arch 😜 without using TOR…Hey fellas, I am glad to be back on Medium once again.(Well well! I know nobody cares 😂) Whatever, I really hope y’all are safe and doing…Nov 8, 20202Nov 8, 20202
Published inInfoSec Write-upsKarberos Authentication ProtocolNow-a-days authentication and security is a concern . Keeping the secrecy and privacy in mind there are a lot of authentication protocols…Mar 27, 2020Mar 27, 2020
Published inMozilla Indiatour de force!!! Got my first Vouch — Proud MozillianFew months ago, while I was surfing LinkedIn and reading some technical posts, I saw some students like me posting their achievements and…Feb 3, 20201Feb 3, 20201
How to make a Simple Website Crawler“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked”Nov 12, 2019Nov 12, 2019