Blog Series
We shortlisted and are considering these blog series to be published but we do not have deadlines for these blog series as of now. Stay tuned!
We shortlisted and are considering these blog series to be published but we do not have deadlines for these blog series as of now. Stay tuned!
Cybersecurity labs are specialized virtual environments where individuals or organizations can test, analyze, and learn cybersecurity.
Cybersecurity Labs: Home Read More »
The PCI DSS v4.0 (Mar 2022) is an overwhelming document of 360 pages. In this blog series, we will break it down into bite-sized chunks
In this post, we will understand basic cryptographic failures and introduce public and private encryption keys.
Cryptographic Failures Read More »
In this post, we will understand what a broken access control looks like and why it is #1 in OWASP Top Ten.
Broken Access Control Read More »
In this post, we will create a new VM for the Open Worldwide Application Security Project (OWASP) tools e.g. WebGoat, Juice Shop and ZAP.
Dz-Owasp #Vulnerable Read More »
In this post, we will understand what OWASP is and its main projects e.g. WebGoat, Juice Shop, ZAP and OWASP Top Ten.
Owasp: Open Worldwide Application Security Project Read More »
In this post, we will use the nmap for host discovery, port-scanning, service detection and vulnerability assessment.
Nmap: Network Mapper Read More »
In this post, we will configure Active Directory on dz-dc(192.168.56.201) and create a domain ‘dangerzone.local’ with an AD user.
In this post, we will use some of the most common tools for network troubleshooting. These tools are shipped with the operating systems.
Common Network Tools Read More »
In this post, we will use Wireshark to capture the network traffic and observe the initial TCP/IP three-way handshake.
Wireshark: Network Protocol Analyzer Read More »
In this post, we will use Angry IP Scanner, a GUI tool, to scan the ‘dangerzone.local’ network for host discovery.