Riya JainLLMNR Poisoning: A Hidden Vulnerability in Windows NetworksIn today’s enterprise environments, Windows-based networks rely heavily on Active Directory (AD) for managing resources and administrative…5d ago5d ago
Riya JainWhat is the CSA STAR Program? A Comprehensive GuideThe CSA STAR (Security, Trust, Assurance, and Risk) program is an essential certification framework for cloud service providers (CSPs)…Sep 9Sep 9
Riya JainMaltego: A Technical Dive into the Ultimate Data Visualization ToolIn the realm of digital investigation and threat intelligence, the quest for comprehensive data visualization and analysis tools has been…Apr 2Apr 2
Riya JainSpiderFoot: A Comprehensive Guide to Installation and UsageSpiderFoot is a powerful open-source intelligence tool that enables users to gather information about a target by utilizing various data…Apr 2Apr 2
Riya JainFile Integrity Monitoring (FIM) in Wazuh: A Step-by-Step GuideWhy File Integrity Monitoring?Jan 29Jan 29
Riya JainStep-by-Step Guide: Installing Wazuh for Enhanced Security OperationsCrafting a Robust Statement of Purpose (SOP) for WazuhJan 29Jan 29
Riya JainPivoting techniques: Part 2This post will cover some useful tools and commands for tunneling and pivoting about pen testing.Dec 31, 2023Dec 31, 2023
Riya JainPivoting TechniquesIn the ever-evolving landscape of cybersecurity, threat actors are constantly finding new and sophisticated ways to exploit vulnerabilities…Dec 31, 2023Dec 31, 2023
Riya JainEnumerating Servers and Services: A Dive into Network EnumerationRecently, I successfully passed my eLearnSecurity Junior Penetration Tester (eJPT) examination, and I’m excited to share some of my notes…Dec 6, 2023Dec 6, 2023