Welcome

This is my simple Blog. My personal experience in cyber security, or more likely, penetration testing and CTF. The best study is explaining it to others. Pls visit & subscribe on YouTube: https://short.7sec.pw/YT

Latest posts

Search Engines for Reconnaissance

Search Engines for Reconnaissance

In order to simulate a cyber attack on an application or a network, the pentester needs access to information about the target. They gather this information in the reconnaissance stage.  Whether a hacker wants to target an entire network or a...

CVE-2021-44228 - Log4j

CVE-2021-44228 - Log4j

A few hours ago, a 0-day exploit in the popular Java logging library log4j (version 2) was discovered that results in Remote Code Execution (RCE) by logging a certain string.

Fuzzing Art with Wfuzz - Basic

Fuzzing Art with Wfuzz - Basic

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc.