This user guide is all about configuration and deployment of telemetry streaming service on F5 BIG-IP device and scraps those metrics by Prometheus which will be finally visualized by the Grafana. ...
History of GSM Technology
The major events of the GSM Technology Development from the early 1980s to the 2000s. During the early 1980s, in the cellular telecommunication sector, the analog cellular telephone system was expo...
Accessing the victim’s computer using the Msvenom
Before we begin the practical assessment of the attack by using Msvenom which is a Metasploit framework, we need to understand the actual work going behind the attack. We are trying to access the v...
what is SSL stripping method?
ssl stripping, is it a potential threat? How does it work and what are the precaution to avoid such an attack? SSL Stripping or SSL Downgrade Attack as the name implies is an attack that uses the S...
Investigate and confirm the status of your System
Investigate and confirm whether the system is under attack or just being paranoid ie. e client in a cooperative environment – Want to know how and where to start from? Follow these steps to be almo...
Possible attacks by using Msvenom
Once the file developed using Msvenom is successfully executed into the victim’s computer then the following attacks can be performed by the attacker- in this case, Kali Linux 2020. At first, we n...