G0DF41TH3R - YUVRAJ SINGHTelephony ProtocolsThis article describes telephony protocols, including the Media Gateway Control Protocol (MGCP), the Session Initiation Protocol (SIP)…Dec 19, 2023Dec 19, 2023
G0DF41TH3R - YUVRAJ SINGHSecuring MQTT Systems — MQTT Security FundamentalsThe best way to open up this discussion about MQTT is by sharing the official abstract of the specification:Dec 6, 2023Dec 6, 2023
G0DF41TH3R - YUVRAJ SINGHServidae: Log Analysis in ELK — TryHackMe Write-UpAnalyze the logs of an affected workstation to determine the attacker’s indicators of compromise.Oct 26, 2023Oct 26, 2023
G0DF41TH3R - YUVRAJ SINGHEnumerating Active DirectoryThis room covers various Active Directory enumeration techniques, their use cases as well as drawbacks.Oct 24, 2023Oct 24, 2023
G0DF41TH3R - YUVRAJ SINGHConfluence CVE-2023–22515Exploit CVE-2023–22515 to get admin access to Confluence Server and Data Center editions.Oct 21, 2023Oct 21, 2023
G0DF41TH3R - YUVRAJ SINGHThreat ModellingBuilding cyber resiliency and emulation capabilities through threat modelling.Oct 21, 2023Oct 21, 2023
G0DF41TH3R - YUVRAJ SINGHHow ChatGPT will disrupt Blockchain Market?The rapid expansion of the Blockchain industry has driven the demand for cutting-edge technologies that can provide insights, predictions…Feb 8, 2023Feb 8, 2023