PinnedPublished inKafkaesque SecurityUncovering The Hidden Secrets of Hiring in The Tech IndustryWhat they don’t tell you about hiring — how to save time and land your dream job tomorrow…Apr 31Apr 31
PinnedPublished inSystem WeaknessWriting a RAT: Remote Access TrojanWhat is a RAT (Remote Access Trojan)?Aug 9, 20233Aug 9, 20233
The PHP script itself is designed to create the websocket and keep it open until the attacker…If you check out the repository and access the specific file used for this lesson, the comments in the script explain how it opens the…Mar 3Mar 3
Published inKafkaesque SecurityOut-of-Band (OOB) SQL Injection — Ingenious Data ExfiltrationThe Silent Extractor: OOB Techniques for Restricted Environments.Feb 23Feb 23
Published inKafkaesque SecurityWelcoming Our New Writers!Welcome to Kafkaesque Security! We go by KafkaSec for short.Feb 111Feb 111
Published inKafkaesque SecurityWhat Type of Malware is a Logic Bomb?If you want to be an expert on Cybersecurity, you need to understand this devious malware…Feb 4Feb 4
Published inKafkaesque SecurityAn Impractical But Impenetrable Guide To CybersecurityThis guide will show you some of the most inspired, deranged, impractical, and effective ways to secure systems so you never have to worry…Feb 2Feb 2
I Don’t Travel Because…People have reasons for staying in one place, and people have reasons for travelling…Feb 1Feb 1
That is a great quesstion, but also one that does not have a straightforward answer.The key aspect I would focus on in the name Remote Access Trojan, is obviously Remote. This malware is going to be attempting to either…Jan 30Jan 30