Kerberos Ticket Granting Server⛃Discover the intricate workings of the ticket-granting server and elevate your understanding to a whole new level.1d ago1d ago
Kerberos Authentication Server🖴Learn about the Kerberos Authentication Server: how the server and client communicate with the Authentication Server, TGS, TGT, and Main…1d ago11d ago1
Published inSystem WeaknessWhat is Kerberos?🐶This article provides an overview of Kerberos and its flow. Future articles will delve deeper into the flow for better understanding.2d ago12d ago1
Published inOSINT TeamExtra information on Type of MemoryThis article explores Writable Memory, Non-Writable Memory, Executable Memory, and Non-Executable Memory, clarifying each type and its…Mar 281Mar 281
What is a Debugger?🪲𖢥🕷Learn what debuggers are, their types, layout, and applications. Also, discovered how to use debuggers effectively.Mar 272Mar 272
The Stack In Operating System🖥📟Understand the stack in operating systems: its purpose, memory layout, functionality, Endianness, and Little-Endian format.Mar 264Mar 264
What is Memory & How Does It Work?𝄃𝄃𝄂𝄂𝄀𝄁𝄃𝄂𝄂𝄃Learn about what memory is and how it functions from a hacker’s point of view, including virtual memory and memory structure.Mar 261Mar 261
Published inOSINT TeamCPU Flags in Nutshell 🗄Discover what CPU flags are and explore some common types of flags.Mar 26Mar 26
Published inOSINT TeamThe CPU Register 🖥Learn about CPU registers and how many there are, and go through every important register. Understanding these will help you better…Mar 251Mar 251
Published inSystem WeaknessWindows Ring Level For Hackers in Nutshell🪟⭕Learn about the different Ring levels in Windows and their importance for exploitation…Mar 25Mar 25
What is The Kernel For Hackers?⚛Now, this article is going to get you an idea of what the kernel is, the structure around it, how it’s architected, and why it’s important…Mar 251Mar 251
Published inSystem WeaknessLinux Run Levels⚙️🏃Understand the run levels in Linux, and how they function, and get a guide for levels 0 to 6, along with their importance to hackers.Mar 23Mar 23
Symbolic Links in Linux🔗Learn about symbolic links, their uses, soft links, hard links, and dead links, among other topics…Mar 231Mar 231
Working with Linux Open Files🗂️Understand Open Files in Linux, including the lsof command, file descriptors (FD), and the Type field.🐧Mar 22Mar 22
Published inSystem WeaknessWhat Are INodes In Linux?!Learn about inodes in Linux: what they are, how to see inodes, and why they're important for exploitation and penetration testing.Feb 26Feb 26
The Art of Managing Linux ProcessesLearn about Linux processes: how they work, their types, creating processes, manipulating processes, and much more.Feb 25Feb 25
The Linux File PermissionsLearn about the format and structure of Linux file permissions, permission classes, symbolic and binary permissions, as well as the concept…Feb 25Feb 25
The Linux File SystemExplore Linux file systems, including EXT4, data blocks, super blocks, groups, bitmaps, inodes, and more…Feb 251Feb 251
Windows Management for Penetration Testing Professionals🖥️Learn how to manage Windows, add or remove users from CMD, and change passwords without the current password. Also, learn about system…Feb 23Feb 23
Published inSystem WeaknessWindows Standard I/O/E In Nutshell✅Understand Windows Standard Input/Output/Error and its significance in penetration testing engagements.Feb 23Feb 23