Skip to content

Rogue Security

Looking under the hood

  • Home
  • About Me

Category: General

  • Home
  • General

Methodology for Secure Code Review

February 20, 2021February 20, 2021 roguesecurity2 Comments on Methodology for Secure Code Review

Introduction Manual Source code review is one of the most essential skills for any penetration tester to have. This is one […]

General, Pentest application security, code review

A guide for windows penetration testing

December 2, 2018December 31, 2018 roguesecurity5 Comments on A guide for windows penetration testing

Windows penetration testing is one of the grey area where many beginner penetration testers struggles with. It is irony that […]

General hacking, oscp, penetration testing, privilege escalation, security, windows

Road to Cisco CCNA Cyber Ops Certification

April 15, 2018 roguesecurityLeave a Comment on Road to Cisco CCNA Cyber Ops Certification

As per ISACA report cited in forbes, there will be shortage of 2 millions cyber security professionals by 2019. To […]

General ccna, cisco, cyberops, secfnd, secops, siem, soc

Understanding wannacry and ransomwares

May 30, 2017August 26, 2017 roguesecurity3 Comments on Understanding wannacry and ransomwares

12th May 2017 was the day when the world saw one of the massive cyber attack in recent times where […]

General

Essential Linux Commands

May 13, 2017July 29, 2017 roguesecurity2 Comments on Essential Linux Commands

If you using google before running each and every Linux command and you finding it intricate to get comfortable with […]

General

Essentials for cyber security

May 10, 2017August 26, 2017 roguesecurity2 Comments on Essentials for cyber security

“Give me six hours to chop down a tree and I will spend the first four sharpening the axe“ This […]

General

Stepping into the field of cyber security?

May 10, 2017July 29, 2017 roguesecurityLeave a Comment on Stepping into the field of cyber security?

Are you a cyber security enthusiast? Does the word “security” fascinates you?  Are you curious to know the things under the […]

General

Recent Posts

  • Methodology for Secure Code Review
  • Attacking and Defending Kubernetes Cluster
  • Docker 101 for busy pentesters
  • Docker commands cheatsheet
  • Abusing Nashorn for Remote Code Execution

Archives

  • February 2021
  • March 2020
  • February 2020
  • July 2019
  • December 2018
  • April 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • July 2017
  • May 2017

Categories

  • Attacks
  • Buffer Overflow
  • containers
  • CTF
  • General
  • kubernetes
  • Pentest
  • Reverse Engineering
  • Uncategorized

Subscribe



Copyright © 2022 Rogue Security Theme: Flash by ThemeGrill. Proudly powered by WordPress