Category: Blog
-
Here comes the lockdown of our country due to the spread of the COVID virus, and we all got confined to our homes. During that time, I tried hard to build a YouTube channel based on the horror genre. It was focused on narrating horror stories with cinematic-level video quality,…
-
Eventually, my father bought a new smartphone, which he also recharged with internet. At that time, I used to recharge BSNL for ₹14, which gave 90MB for 2 days… sounds strange, right? I got the chance to experiment with it, and that’s when I became more interested in technology. I…
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
-
+
+
+
+
+
+
When it comes to computers, I had access to them from an early age. My uncle, my father’s brother had a computer, and as a kid, I used to play games on it. He mainly used it for Photoshop work, and I would often watch him edit photos. Around 5th…
-
My inner mind was always telling me to become rich, become famous, and become the man I truly want to be. But at that time, I wasn’t realizing it clearly,I was just going with the flow. My parents wanted me to become a doctor or a government employee. Everything seemed…
-
So, let’s talk about the founding of Strawhat Hackers… but if you want to know that story, then there’s no option left for us we have to go back a few years, back when I was studying in 10th standard. But the cause started much earlier. I think I started…
-
+
+
+
+
+
+
“I’ve set myself to become the King of Pirates… and if I die trying… then at least I tried.” – Monkey D Luffy(Future King of The Pirates) Everyone in this world has the freedom to show who they truly are, yet most people fall into a cycle: they are born,…
-
+
+
+
+
+
+
Introduction NAT protocol stands for Network Address Translation protocol. It is the protocol that helps us use a single global IP address across our local area network and use it to surf the internet. As you know, the devices within our network have local IP addresses, and only the router…
+
+
+
+
+
+
+ NAT for cybersecurity, NAT for Cybersecurity aspirants, nat for dummies, NAT for hackers, NAT Protocol, protocol for hackers+
+
+
+
+
+
+
+
+
+
+
+
-
+
+
+
+
+
+
What is Information Disclosure? Imagine that while scrolling through a website’s source code, you come across the admin username and password that were hardcoded by the developer and forgotten to be removed. Because you are a white hat, it’s not a problem you’ll inform the site owner. But what if…
+
+
+
+
+
+
+ bug, bug hunting, information disclosure, information disclosure in web app, owasp top 10, vulnerability, web app pentesting, web pentesting+
+
+
+
+
+
+
+
+
+
+
+
-
+
+
+
+
+
+
Introduction If you’re new to OWASP Juice Shop, try to follow the tasks in order. If you’re interested, follow our series for more guidance. OWASP Juice Shop is an intentionally vulnerable web application project that can be used by beginners or cybersecurity aspirants to improve their skills in web application penetration…
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
-
+
+
+
+
+
+
Introduction OWASP Juice Shop is an intentionally vulnerable web application project that can be used by beginners or cybersecurity aspirants to improve their skills in web application penetration testing. It is a great platform to practice on before stepping into the world of bug hunting, as it gives you an…
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+