Microsoft launch Azure Sphere OS

What is new in Microsoft? Recently, Microsoft has announced that they will launch a linux distro of its own from the simply loving Linux. The purpose is to aimed for the Internet of Things(IoT) market…

The new DNS analysis

Introduction Recently, A new DNS(Domain Name Server) that been securely safe to use in network environment. The new IP that been introduce by Cloudflare recently is 1.1.1.1. Because of that, it will make the life…

XXE Attack Master class

What is XXE Attack? The XXE Attack(XML External Entity) is an attack where it against an application that will parses XML input. Like other attack, this attack can lead to any expose any of confidential…

Computer Forensic

What is Computer Forensic? Computer Forensic is an progress that include a few step like presenvation, identification, extrction, interpretation, and documentation of computer evidence. When all the evidence is computer analyze, it will be provide…

Prowler – AWS Security Assessment tools

What is Prowler? During my research on how to do an security assessment on the cloud infrastructure, i stumble with Prowler tools which been write by Toni de la Fuente Twitter. The origin of the "Prowler"…

Denial of Service Masterclass Part 1

What is Denial of Service? The attack is a old school attack where the attacker can render any system to be unusable or significantly make the system a little slow  for legitimate users, by overloading…

CryptoJacking

Cryptojacking is a new terms that means as a secret use of your computing device to mine cryptocurrency where it normally used on the purpose of be confined to the victim without their awareness. The…

OpenSSL alpha with TLS 1.3 included

TLS 1.3 have been included into OpenSSL alpha so that the developer can proceed with their system and infrastructure. People have waited this to be working into place since April 2014 where the first version of…

Information Gathering Method

Information gathering is gain any information of an organization or a person . Sometimes, Information Gathering need some "soft skills" and social engineering method. There is a lot of choice of information gathering such as…

Penetration Testing Walkthrough

As most of us know, Penetration Testing will need to follow a few step in order to testing the server and network. Below are the manual that need to be doing during the Penetration Testing…