PinnedTheBitDoodler's ByteinInfoSec Write-upsBehind the Screens: Exploring a Fresh Phishing Campaign in Indonesia Stealing Facebook CredentialsOver the weekend, while leisurely browsing the internet, I came across a unique and suspicious link designed specifically for an Indonesian…Oct 2, 2023Oct 2, 2023
PinnedTheBitDoodler's ByteinInfoSec Write-upsDomain Name System 0x1 | DNS 101Hey techies, you’ve come to the right place if you’re looking to learn about or refresh your knowledge of DNS. We will be providing a…Jan 14, 2023Jan 14, 2023
TheBitDoodler's ByteinInfoSec Write-upsHow to Route all your traffics through TOR in Kali Linux May be Linux Arch 😜 without using TOR…Hey fellas, I am glad to be back on Medium once again.(Well well! I know nobody cares 😂) Whatever, I really hope y’all are safe and doing…Nov 8, 20202Nov 8, 20202
TheBitDoodler's ByteinInfoSec Write-upsKarberos Authentication ProtocolNow-a-days authentication and security is a concern . Keeping the secrecy and privacy in mind there are a lot of authentication protocols…Mar 27, 2020Mar 27, 2020
TheBitDoodler's ByteinMozilla Indiatour de force!!! Got my first Vouch — Proud MozillianFew months ago, while I was surfing LinkedIn and reading some technical posts, I saw some students like me posting their achievements and…Feb 3, 20201Feb 3, 20201
TheBitDoodler's ByteHow to make a Simple Website Crawler“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked”Nov 12, 2019Nov 12, 2019