Telephony ProtocolsThis article describes telephony protocols, including the Media Gateway Control Protocol (MGCP), the Session Initiation Protocol (SIP)…Dec 19, 2023Dec 19, 2023
Securing MQTT Systems — MQTT Security FundamentalsThe best way to open up this discussion about MQTT is by sharing the official abstract of the specification:Dec 6, 2023Dec 6, 2023
Servidae: Log Analysis in ELK — TryHackMe Write-UpAnalyze the logs of an affected workstation to determine the attacker’s indicators of compromise.Oct 26, 2023Oct 26, 2023
Enumerating Active DirectoryThis room covers various Active Directory enumeration techniques, their use cases as well as drawbacks.Oct 24, 2023Oct 24, 2023
Confluence CVE-2023–22515Exploit CVE-2023–22515 to get admin access to Confluence Server and Data Center editions.Oct 21, 2023Oct 21, 2023
Threat ModellingBuilding cyber resiliency and emulation capabilities through threat modelling.Oct 21, 2023Oct 21, 2023
How ChatGPT will disrupt Blockchain Market?The rapid expansion of the Blockchain industry has driven the demand for cutting-edge technologies that can provide insights, predictions…Feb 8, 2023Feb 8, 2023