This blog is where I share my daily notes, practical tools, tutorials, and learning journey written in simple words for beginners.
Let’s learn together!
- All Posts

I design a lab , for initial device configuration, how to connect to cisco router or switch, initial device configuration;...

Introduction: In this blog I’ll explain why routers security is important and share the practical hands on walk through of...

Summary This report documents a successful penetration test against a Windows 7 Home Premium SP1 system. The assessment demonstrates how...

Objective: To demonstrate common web application vulnerabilities (SQLi, XSS, CSRF) using DVWA, live website & document exploitation with payloads and...

Skills Learned from this Project: Executive Summary of Project: This project demonstrates a full offensive security workflow in a controlled...

Introduction: Directory enumeration is the process of finding hidden directories and files on web server. Because sometimes the hidden directories...

1. Introduction. Scanning is the second phase of performing ethical hacking. After collecting data in reconnaissance we will move on...

My Practical approach for Reconnaissance in Ethical hacking. Tools, Commands & Practical Guide (2025) Introduction: The word Reconnaissance means “gather...

What are Cyber security attack trends? The cyber security attack trend is the methods or techniques which hackers or attackers...
Elevate Your Brand with Stunning Websites & Engaging Content.
Support
Help Center
Report an Issue
FAQ
Contact
Live Chat