How I passed OSCP on the first attempt? [ Part 2 ]
Ultimate Strategy And Tools To Pass OSCP
![How I passed OSCP on the first attempt? [ Part 2 ]](/_next/image?url=https%3A%2F%2Fcdn.hashnode.com%2Fres%2Fhashnode%2Fimage%2Fupload%2Fv1686190683044%2F403df02f-7fd6-4229-b768-9b3ccbbbb123.avif&w=3840&q=75)
Search for a command to run...
Articles tagged with #security
Ultimate Strategy And Tools To Pass OSCP
![How I passed OSCP on the first attempt? [ Part 2 ]](/_next/image?url=https%3A%2F%2Fcdn.hashnode.com%2Fres%2Fhashnode%2Fimage%2Fupload%2Fv1686190683044%2F403df02f-7fd6-4229-b768-9b3ccbbbb123.avif&w=3840&q=75)
Get Started With CI/CD Using GitHub Actions

How my "Unsubscribe Tragedy" could have been another security nightmare? 馃

The CIA triad, also known as confidentiality, integrity, and availability, is a concept created to direct information security policies inside a company. To avoid confusion with the Central Intelligence Agency, the approach is sometimes frequently re...
![What is the CIA triad? [CHAPTER - 1]](/_next/image?url=https%3A%2F%2Fcdn.hashnode.com%2Fres%2Fhashnode%2Fimage%2Fupload%2Fv1656060182102%2FC2ehtgUpk.png&w=3840&q=75)
Dashboards are necessary especially when you are doing much more advanced stuff. Pentesters/Bug bounty hunters can save both time and energy by building efficient dashboards to bring ease to their jobs. By dashboards what I mean is basically automati...

Subdomain takeovers are now becoming harder and harder to find as people have set up massive automated monitorings to detect subdomain takeovers. It gets a lot harder if you are new to bug bounty as the unique techniques are unknown to you. So what d...
