Android
Latest Posts

Kubernetes Cluster Interactive Architecture Diagram
Kubernetes Cluster – Interactive Architecture Diagram
Share this:

OWASP TOP 10 – Flashcards
OWASP TOP 10 – Flashcards. Learn OWASP Top 10 using flashcards
Share this:

Cybersecurity and Ethical Hacking Terminologies – Flashcards
Cybersecurity and ethical hacking terminologies Flashcards
Share this:

Kubernetes Cluster Setup in Laptop Using VirtualBox
Kubernetes Cluster Setup in Local Machine Using VirtualBox and Ubuntu.
Share this:

log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
What is log4shell ? “Log4Shell” got its name by researchers at LunaSec and credited to Chen Zhaojun of Alibaba. It is an remote code execution vulnerability. This vulnerability has been found in Apache Log4j library, which is an open source logging utility which is written in Java and developed by Apache Software Foundation. This library is… Read More »log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
Share this:
Enabling Root User in Kali Linux
In some of the cases you may need to login using the superuser root in Kali Linux. However, by default the root user in Kali Linux is disabled and when you try to login you will get password is incorrect error. In this case, you will have to install a package and make some modifications… Read More »Enabling Root User in Kali Linux
Share this:
Loading…
Something went wrong. Please refresh the page and/or try again.