Unpacking Network Traffic: Analyzing PCAP File with Wireshark.The PCAP file I’m analyzing comes from a recent Capture the Flag (CTF) cybersecurity challenge I attended, held in a nearby town. This CTF…4d ago4d ago
Exploiting the CUPS Vulnerability and Gaining a Reverse Shell (9.9 CVSS)Let’s start by introducing our readers to what CUPS (Common Unix Printing System) is and what they need to know to follow along with this…Oct 11Oct 11
“Mastering” the Art of Programming in 2023: A Comprehensive Guide for Beginners.Hello, everyone! Welcome back to my blog, this is my third blog of the year and I can’t wait to share more with you. In this blog, I will…Jan 29, 20231Jan 29, 20231
Learn to Hack Web Apps for FreeHello, everyone. I hope everything is going well for you. I am back again with another article and this time I will be guiding you on how…Aug 29, 20221Aug 29, 20221
Python3 Roadmap and Resources Guide For BeginnersHello, welcome back! My name is Zuber, and I am interested in programming because it helps everyone in their journey in the tech field no…Jul 16, 2022Jul 16, 2022