Blog
Home / Blog

NGINX Zero-Day Vulnerability 1
What is NGINX ? NGNIX is an open-source web server that can also act as a reverse proxy, load balancer, mail proxy, and HTTP cache.

Benefits of Penetration Testing
Synopsis Breaking into a company’s security defenses takes a long time and skill. However, modern techniques make it easier than ever for threat actors to

Wifi Hacking (Pt.1)
Wi-Fi stands for wireless network technology. It establishes wireless network connections using radio waves. Malicious hackers frequently opt to penetrate firms by compromising their Wi-Fi

Spring4Shell Vulnerability
Synopsis A sequence of Tweets (that are now deleted) from a Chinese Twitter account was posted on March 29th, 2022, displaying pictures of a new

Hacking GraphQL (Part 3)
In Part 2 of the Hacking GraphQL series, we discussed the GraphQL DoS attack. In Part 3, we’re going to try to exploit the SQLi

Server-Side Request Forgery
SSRF vulnerabilities allow an attacker to send crafted malicious requests from the back-end server of a vulnerable application. Criminals usually operate SSRF attacks to target

Antivirus Evasion (Part 2)
In Part 1 of our Antivirus Evasion series, we managed to get a meterpreter reverse shell while evading Windows Defender by writing an .exe file

Hacking GraphQL Part 2
In part 1 of the Hacking GraphQL series, we discussed about the basics of GraphQL. In part 2 of this series, we’re going to try

No SQL Injection
NoSQL Injection refers to cyber-attacks that inject malicious payloads into non-SQL databases like MongoDB. Due to the new demand for modern-day applications, there has been

Antivirus Evasion (Part 1)
Antivirus Evasion in general use signature-based and heuristics-based malware detection mechanisms. In this blog, we will learn and test some techniques to try and bypass

Hacking GraphQL Part 1
GraphQL is quickly becoming the alternative to REST API, being able to request a specified set of data across multiple resources within a single request.