Published onJune 5, 2024The Anatomy of a Social Engineering AttackphishingCTIemail-analysisphishing-linkfacebookhacksocial-engineeringreal-worldA breakdown of how social engineering attacks are carried out, from the initial research phase to the execution and exit strategies.
Published onMay 15, 2024Windows Password/Login Screen Bypassbackdoorread-teamhackingwindows-password-bypasslogin-screenhackingtechniquesbypassHow to Bypass windows password.
Published onMay 3, 2024Pakistan Prime Minister's Office Themed Phishing PDF File Evaded All the AV SolutionsAVred-teamMITREmalicious-pdfPakistanprime-ministeriocbreachMy insights on suspicious file detection that targeted Pakistan PM Office.
Published onApril 14, 2024Trace IP InformationIPtrackinformationms-wordlocate-personhackingtechniquesTrack IP address and location of person by sending simple word or other files.
Published onMarch 15, 2024Hide Backdoors in Scheduled Tasksbackdoorread-teamhackingred-team-tipsscheduled-taskshackingtechniquestipsTip to hide backdoor in Scheduled Tasks.
Published onMarch 1, 2024eJPTv2 Exam ReviewejptexampentestingcertificationhackingINEelearneJPTv2My thoughts on INE Elearn Security eJPTv2 Certification.