In this blog, I’ll walk through how I created a heat map for the Linux computer labs at IIT Kanpur. This approach can be applied to any institute or organization with a similar setup.
This blog explores how I successfully escalated privileges to root on a remote server through social engineering, highlighting the techniques used and offering mitigation strategies to prevent such attacks.
In this blog, we explore how to gain remote root access on devices via Portainer, covering OSINT techniques, brute-force attacks, and exploiting misconfigurations, while offering mitigation strategies to enhance security.
How attackers can gain access to CCTV devices via the RTSP protocol, using tools like Shodan, Google Dorking, and port scanning.
This blog dives into password cracking techniques like brute force and dictionary attacks, highlighting how attackers exploit weak passwords and the importance of strong security measures