Firefox Containers

I came across a cool Firefox extension in the Practical Bug Bounty course by TCM Security. This extension is called Firefox Multi-Account Containers by Mozilla Firefox. This extension will enable you to have separate Firefox browser sessions in one web browser. This can come in handy for penetration testing or Read more

TLS Certificates

SSL Certificates to TLS Certificates SSL (Secure Sockets Layer) certificates, now more commonly referred to as TLS (Transport Layer Security) certificates, are digital certificates that facilitate secure, encrypted communication over the internet. They play a vital role in protecting sensitive data during transmission, such as login credentials, personal information, and Read more

Cyber Defense Training

I provide live instructor-led cyber defense training. The outline of the course is detailed below. Contact me for more information or to schedule a training. I. IntroductionA. Importance of online securityB. Overview of the training topics II. Understanding the BasicsA. Online threats and common attack vectorsB. Personal data and its Read more

Threat Modeling

nd threats within an application, system, or network. It involves systematically analyzing the architecture, components, and data flows to understand how attackers might exploit weaknesses. Threat Modeling in Penetration Testing 1. Scope Definition: 2. Gather Information: 3. Identify Assets and Data Flows: 4. Decompose the System: 5. Identify Threats: 6. Read more

Kerberosting

Kerberoasting is a popular attack technique used by cybercriminals to exploit the Kerberos protocol in Windows Active Directory environments. This blog post will discuss the inception of kerberosting, its impact on Active Directory environments, and the steps penetration testers take to use this technique in their assessments. We’ll delve into Read more

curl command

The curl command is a versatile and powerful tool that allows users to transfer data to and from a server using various network protocols such as HTTP, HTTPS, FTP, and more. It is widely used by developers, system administrators, and even casual users for tasks ranging from testing APIs to Read more