Build
Notes from writing for STEC
What happened when I tried to write what I know
Building a product isn't about just coding. Creation looks cool until it creates experiences. It's lots of things outside coding that lead to a useful product.
Build
What happened when I tried to write what I know
Build
Monday: “Let’s align on priorities.” Tuesday: “We’re blocked on X changes.” Wednesday: “Let’s push this to next week.” Thursday: “Would it be done by Monday? By Monday morning? At 11 am?” Friday: “Can someone summarize this in the tracker?” By the time the week ends, alignment is
Build
Ask before it goes "out of order"
Build
Which of the following is a safer password? 1. wG1eqe#4D 2. therearemanyunpopularopinions General opinion: 1 is safer because it has capital, small letters, numbers, special characters, etc. It’s harder to break. Probably it will take many months to break it. It is impossible for a person to guess
General opinion: Five mins? Five days? (Dare I say it) I have no idea, we sit until it’s found out. This must have happened when your production would have gone under crisis. The whole team would have come up forming a crew to fix up. Alternate opinion: If your
Build
General opinion: Being in an industry that works with organizations and not with individuals, it is considered to be useful to have their work emails to create a relationship of retention. There’s no whose account is it? disputes and easier handoff organizations. Alternate opinion: In addition to the above,
In the last article, I had shared after this article you’ll master LAN sniffing. I hope you have tried your hands on the techniques shared in it. Then, let’s go and learn. How to use Wireshark? Wireshark is an open-source packet analyzer that can be used to capture,
Build
What if I tell you it can still give you this: If you’re reading this article, I assume you would know about DAN. A popular method used to get over ChatGPT before it became ChatGPT 4. Well, the more mysterious this world of AI is, the more is bypassing
With the ending of the last article, we have successfully exploited a system, now what? As a pentester, when you’ll share vulnerability with the organization, you’ll have to show them the impact. This article is about creating that level of impact. Post exploitation — The last step In post-exploitation,
Build
Clients are called the weakest links to take advantage of. They get stuck into the PDF attacks like shared in the last article and email attacks. Like I had said, it’s not only about securing your server, it’s also about helping your clients to take intelligent decisions when
PDF hacking is one of the exclusive topics when working in client-side exploitation. This is about creating malicious PDF documents and providing them to the user in some way from the target. In the last article, we talked about the ways by which clients are attacked. Have you tried SET
Metasploit is a powerful tool that is used by ethical hackers to find vulnerabilities on networks and servers. It helps to find the weak spots in the network. I know, how eager you are to know about this tool. Have you completed the rest of the articles on remote exploitation?