This blog is where I share my daily notes, practical tools, tutorials, and learning journey written in simple words for beginners.
Let’s learn together!
- All Posts

Introduction: Directory enumeration is the process of finding hidden directories and files on web server. Because sometimes the hidden directories...

1. Introduction. Scanning is the second phase of performing ethical hacking. After collecting data in reconnaissance we will move on...

My Practical approach for Reconnaissance in Ethical hacking. Tools, Commands & Practical Guide (2025) Introduction: The word Reconnaissance means “gather...

What are Cyber security attack trends? The cyber security attack trend is the methods or techniques which hackers or attackers...

If you are learning cyber security or ethical hacking then it’s very important for you to know about the VPN....

7 Phases of a Cyberattack Explained! Introduction to Cyber Kill Chain: Cyber Kill Chain means the phases of attack performed...

Introduction to Ethical Hacking: As it is start of the module named as “Ethical Hacking” in the Diploma of advance...

OWASP Top 10 Vulnerabilities! OWASP (Open web application Security Project). Is an organization that publishes the list of top 10...

Introduction In today’s post we will discuss about the most common attack happening right now in the world of cyber...
Elevate Your Brand with Stunning Websites & Engaging Content.
Support
Help Center
Report an Issue
FAQ
Contact
Live Chat