burp-suite.hashnode.devWhat is Burp Suite ?Burp Suite is Java based framework designed to serve as a comprehensive solution for conducting web application penetration testing.It captures and enables manipulation of all the HTTP?HTTPS traffic between a browser and a web server. Burp Suite is ...Oct 17, 2025·7 min read
metasploit-introduction-tryhackme.hashnode.devIntroduction to Metasploitmsfconsole -to launch Metasploit Exploit: A piece of code that uses a vulnerability present on the target system. Vulnerability: A design, coding, or logic flaw affecting the target system. The exploitation of a vulnerability can result in disclosin...Aug 27, 2025·18 min read
moniker-link-cve-2024-21413.hashnode.devMoniker Link (CVE-2024-21413)Introduction On February 13, 2024, Microsoft disclosed CVE-2024-21413, a critical Outlook vulnerability discovered by Haifei Li of Check Point Research. The flaw allows attackers to bypass Outlook's security using a Moniker Link — a special type of h...Jul 30, 2025·5 min read
john-the-ripper-the-basics.hashnode.devJohn the Ripper: The BasicsBasic Terms What are Hashes? A hash is a way of taking a piece of data of any length and representing it in another fixed-length form. This process masks the original value of the data. The hash value is obtained by running the original data through ...Jul 26, 2025·20 min read
hashing-basics.hashnode.devHashing BasicsIntroduction Consider the scenario where you just downloaded a 6 GB file and want to know whether the copy you downloaded is identical to the original file, bit for bit. How would you do that? Or if a good Samaritan handed you this 6 GB file on a USB...Jul 25, 2025·17 min read