Riya JainMaltego: A Technical Dive into the Ultimate Data Visualization ToolIn the realm of digital investigation and threat intelligence, the quest for comprehensive data visualization and analysis tools has been…3 min read·Apr 2, 2024----
Riya JainSpiderFoot: A Comprehensive Guide to Installation and UsageSpiderFoot is a powerful open-source intelligence tool that enables users to gather information about a target by utilizing various data…2 min read·Apr 2, 2024----
Riya JainVulnerability Detection through WazuhWhat is Vulnerability detection?3 min read·Jan 29, 2024----
Riya JainFile Integrity Monitoring (FIM) in Wazuh: A Step-by-Step GuideWhy File Integrity Monitoring?4 min read·Jan 29, 2024----
Riya JainStep-by-Step Guide: Installing Wazuh for Enhanced Security OperationsCrafting a Robust Statement of Purpose (SOP) for Wazuh2 min read·Jan 29, 2024----
Riya JainPivoting techniques: Part 2This post will cover some useful tools and commands for tunneling and pivoting about pen testing.4 min read·Dec 31, 2023----
Riya JainPivoting TechniquesIn the ever-evolving landscape of cybersecurity, threat actors are constantly finding new and sophisticated ways to exploit vulnerabilities…3 min read·Dec 31, 2023----
Riya JainEnumerating Servers and Services: A Dive into Network EnumerationRecently, I successfully passed my eLearnSecurity Junior Penetration Tester (eJPT) examination, and I’m excited to share some of my notes…4 min read·Dec 6, 2023----
Riya JainUnveiling My Decision to Pursue the eJPT CertificationIntroduction:2 min read·Dec 5, 2023----
Riya JainUnveiling the Shadows: Footprinting and Scanning in Network SecurityAs I gear up for the EJPT (eLearnSecurity Junior Penetration Tester) certification, I’m excited to share some key insights and highlights…2 min read·Nov 13, 2023----