securityand.devFinding Technical Weakness with NiktoIn the previous article of this series, we learned how to use Recon-ng. Through this tool, we have known how we can gather information about our target. Now it's time to identify technical weakness the target may have in its services like web apps,...Oct 14, 2020·7 min read
securityand.devInformation Gathering with Recon-ng (also learn Recon-web)In the previous article of this series, we learned about how to use theHarvester tool. theHarvester is a good tool but, it is not sufficient when it comes to Information Gathering. theHarvester is mainly used for passive reconnaissance, Passive Rec...Aug 26, 2020·14 min read
securityand.devThe complete beginners guide to Cryptography (with pictures)As a developer, you will always agree that nothing in this world (especially in tech) is 100% secure. Whether you are making the next fancy software or maybe the next big tech giant bugs and security issues will be a part of your journey. Some proble...Jul 24, 2020·19 min read
securityand.devInformation Gathering with "theHarvester"This is the first tool in the Red Team Tools series that I will be talking to you today. In this post, you will learn how to gather both technical and helpful information about your target using theHarvester tool. In a red team engagement, one of ...Jul 20, 2020·10 min read
securityand.devWhat is an API?Have you ever shopped at a place that promised lower prices, by cutting out the middleman? Although this might make things easier in the real world by not having to deal with that cheesy storefront and high-pressure salesman. But that middleman is ac...May 1, 2020·5 min read