Security In Mind
IT and Security Blog ~ $
What is a Home Lab? Think of a home lab as a place where you can fail in the privacy of your own home. As Thomas ….
OSCP ApproachFor you to begin, I have divided the OSCP Preparation in three phases i.e. Pre-Enrollment, Post-Enrollmentand Examination. Hope this helps!! *Basic understanding** Reverse and ….
Metasploitable 3 is a vulnerable machine that is built from the ground up with a large amount of security vulnerabilities. It is intended to be ….
When the Internet was small, the association of domain names with IP addresses could fit into single text file . The networked computers were few ….
The hosts file is a unique file that is located on your computer that is used as a first point of lookup for DNS hostname ….