Open in app

Sign In

Write

Sign In

Vasanth Vanan
Vasanth Vanan

100 Followers

Home

About

Feb 24

How I passed CompTIA Exams?

With the increasing digitalisation, the importance of cybersecurity is crucial. Numerous organisations are seeking out professionals in networking and cybersecurity. CompTIA exams are highly valued and demonstrates your knowledge to potential employers. However, passing these exams can be challenging, and it requires a lot of dedication, time, and effort. In…

Comptia

5 min read

How I passed CompTIA Exams?
How I passed CompTIA Exams?
Comptia

5 min read


Published in System Weakness

·Jan 1

Ignite: Walkthrough

Welcome to the walkthrough of Ignite CTF on TryHackMe! In this CTF, my goal was to find two flags: user.txt and root.txt. To start, I ran an nmap scan on the machine to see what ports were open and what services were running. …

Tryhackme

4 min read

Ignite: Walkthrough
Ignite: Walkthrough
Tryhackme

4 min read


Dec 25, 2022

Hacking Overpass CTF: Guide

Resource: TryHackMe Welcome to the Overpass CTF on TryHackMe! If you’re new to THM, make sure to complete this tutorial first to familiarise yourself with the platform. The Overpass CTF consists of three rooms, each with its own set of challenges to complete. In this blog, I’ll be focusing on…

Hacking

4 min read

Hacking Overpass CTF: Guide
Hacking Overpass CTF: Guide
Hacking

4 min read


Mar 25, 2020

Inspecting — KrØØk Vulnerability

If you are reading this article, I believe you have connected to a WiFi network, and there are chances that you are vulnerable to a new security issue called — “ The Kr00k Vulnerability ”, which could decrypt the WPA-2 encryption without any authorization. …

Security

4 min read

Inspecting — KrØØk Vulnerability
Inspecting — KrØØk Vulnerability
Security

4 min read


Jun 12, 2019

.Onion — The Real incognito

also the magic clue for Onion routing (TOR) Some Internet users still believe surfing through incognito mode makes you invisible to the internet. Sorry, but Google Chrome’s incognito isn’t as private as you think. It only hides traces of your activity from people using your computer, not the Internet. …

Privacy

4 min read

.Onion — The Real incognito
.Onion — The Real incognito
Privacy

4 min read


Mar 23, 2019

Karaoke: Sing-Along

Sometimes, You will be so good at singing when you sing along with the song, and you would often go poor, feel awkward when you sing without the song’s Instrumentals/background. It Happens! To test how well you sing, you require a Karaoke-Version of the song. The practice of Karaoke was…

Music

3 min read

Karaoke: Sing-Along
Karaoke: Sing-Along
Music

3 min read


Feb 13, 2019

SS7 — THE DEADLIEST ATTACK

Smartphones have created a revolutionary change in telecommunication and their usability extends way beyond what is expected. A recent report says: Children spend twice as long on smartphones as talking to their parents. This is terrible! Smartphones are used by people for almost every task nowadays. From making online payments…

Security

5 min read

SS7 — The Deadliest Attack
SS7 — The Deadliest Attack
Security

5 min read


Jan 14, 2018

GOOGLE SEARCH: ARE WE DORKING IT RIGHT?

Google — the name of a company has now become its word in the dictionary. — Google grows and grows despite facing so many obstacles! So ever wondered how Google works? I had this question right from the day I got unbelievable results when I google searched! Suppose you search for a term, say “amazon” and you hit Enter, all related websites, and images would be…

SEO

5 min read

GOOGLE SEARCH: ARE WE DORKING IT RIGHT?
GOOGLE SEARCH: ARE WE DORKING IT RIGHT?
SEO

5 min read


Dec 11, 2017

ENCRYPTION : THE ART OF CRYPTOGRAPHY

Introduction: Cryptography is a method of storing and transferring data by encoding it into an unreadable format where no one can understand the actual approach of the message. In this blog, we’ll learn about various cryptographic functions used in real-time applications. The main framework of the cryptography: PlainMessage — Encryption —…

Security

5 min read

ENCRYPTION : THE ART OF CRYPTOGRAPHY
ENCRYPTION : THE ART OF CRYPTOGRAPHY
Security

5 min read

Vasanth Vanan

Vasanth Vanan

100 Followers

Penetration Tester

Following
  • Xploit Ayush ☠️

    Xploit Ayush ☠️

  • Prabath Siriwardena

    Prabath Siriwardena

  • Ackermann Yuriy

    Ackermann Yuriy

  • PentesterLab

    PentesterLab

  • Rana Khalil

    Rana Khalil

See all (5)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech