PinnedSurya SadanalaCEH Study Guide-Module 2: Reconnaissance and Footprinting⚡ This chapter have Practical LabsAug 19Aug 19
PinnedSurya SadanalaCEH Study Guide-Module 1:Introduction to Ethical HackingFundamental Security ConceptsAug 16Aug 16
Surya SadanalaCEH Study Guide-Module 5: Vulnerability AnalysisAttackers perform VA to identify security loopholes in the target’s network, and end devices. The identified Vulnerabilities are used by…Sep 12Sep 12
Surya SadanalaReconnaissance and Footprinting Practical Labs0. What is Footprinting and Reconnaissance?Aug 18Aug 18
Surya SadanalaXSS Payloads Part-1“-prompt(8)-” ‘-prompt(8)-’ “;a=prompt,a()// ‘;a=prompt,a()// ‘-eval(“window[‘pro’%2B’mpt’](8)”)-’ “-eval(“window[‘pro’%2B’mpt’](8)”)-”…May 20May 20
Surya SadanalaVulnhub Walkthrough : SunsetHello everyone, this is Surya. I’m a security analyst. Today, we will be conducting a walkthrough of the Sunset vulnerable machine.May 16May 16