Phishing attack, a largest company in Bangladesh was targeted by Threat Actor Storm 1575One of my colleague send me an email as .eml format that contains the phishing mail. He requested me to analyze it and to to give him…1d ago1d ago
SQLmap cheat sheetDisclaimer: Before using the sqlmap tool, you must have proper permission to play with the database. Hacking is illegal. The author will…2d ago2d ago
How to download VMware Workstation Pro 17.x.xAs you might know by seeing the title that why am I writing this? Yes, the reason is after Broadcom purchased vmware, since then so many…Oct 20Oct 20
How to integrate RSA hardware token SID700 with Swift alliance applicationAfter you decrypting the hardware token and uploading it to the authentication manager, now the next task is integrating it with swift web…Sep 10Sep 10
Patching RSA Authentication Manager from 8.7 SP2 to Patch 3Why we need to patch this? The RSA says that due to the radius vulnerability CVE-2024–3596 raised, you should immediately patch your AM…Aug 31Aug 31
How to Recover Accidentally Closed Tabs in Your Browser: A Comprehensive GuideNote: First of all, you need to install the addons initially and do the things that I am gonna show you now. Only afterwards if you…Jun 26Jun 26
Deploying RSA SecurID 2FA Authentication Manager with Replica, Part-2If you directly come into this writeup, I request you to see the first one. Here is the link.Jun 23Jun 23
Deploying RSA SecurID 2FA Authentication Manager with Replica, Part-1In this writeup, we will deploy RSA authentication manager 8.7 SP2Jun 23Jun 23
How I build the malware analysis and reverse engineering Flare VMThough everything is well documented in their GitHub repo (https://github.com/mandiant/flare-vm), but still I want to make it as the step…Jun 2Jun 2
Game of Active Directory (GOAD), setup the lab in linux machineHere in our esxi server, we have created a vm named GOAD-VM and giving resources of 32 GB ram, 8 core cpu’s and 500 GB hard disk (because…May 241May 241