Riya JainMaltego: A Technical Dive into the Ultimate Data Visualization ToolIn the realm of digital investigation and threat intelligence, the quest for comprehensive data visualization and analysis tools has been…Apr 2Apr 2
Riya JainSpiderFoot: A Comprehensive Guide to Installation and UsageSpiderFoot is a powerful open-source intelligence tool that enables users to gather information about a target by utilizing various data…Apr 2Apr 2
Riya JainFile Integrity Monitoring (FIM) in Wazuh: A Step-by-Step GuideWhy File Integrity Monitoring?Jan 29Jan 29
Riya JainStep-by-Step Guide: Installing Wazuh for Enhanced Security OperationsCrafting a Robust Statement of Purpose (SOP) for WazuhJan 29Jan 29
Riya JainPivoting techniques: Part 2This post will cover some useful tools and commands for tunneling and pivoting about pen testing.Dec 31, 2023Dec 31, 2023
Riya JainPivoting TechniquesIn the ever-evolving landscape of cybersecurity, threat actors are constantly finding new and sophisticated ways to exploit vulnerabilities…Dec 31, 2023Dec 31, 2023
Riya JainEnumerating Servers and Services: A Dive into Network EnumerationRecently, I successfully passed my eLearnSecurity Junior Penetration Tester (eJPT) examination, and I’m excited to share some of my notes…Dec 6, 2023Dec 6, 2023
Riya JainUnveiling the Shadows: Footprinting and Scanning in Network SecurityAs I gear up for the EJPT (eLearnSecurity Junior Penetration Tester) certification, I’m excited to share some key insights and highlights…Nov 13, 2023Nov 13, 2023