Bug bounty

computer netwoking for hackers

Computer Networking

What is Networking ? A computer network comprises two or more computers that are connected—either by wired or wireless with the purpose of transmitting, exchanging, or sharing data and resources. You build a computer network using hardware (e.g., routers, switches, access points, and cables) and software (e.g., operating systems or business applications). Geographic location often …

Computer Networking Read More »

SQL tutorials for beginners

SQL Tutorial for beginners

In this blogs you will learn about SQL, SQL server management, SQL server, How to run SQL commands, SQL injection, SQL developers and You will also learn about MANAGING TRIGGERS, MANAGING INDEXES, MANAGING VIEWS, MODIFYING DATA, USING SQL CONSTRAINTS, MANAGING TABLES, USING SQL OPERATORS, QUERYING FROM MULTIPLE TABLES, QUERYING DATA FROM A TABLE and etc. ou will also learn about SQL, SQL server and etc.

Network Security

Network Hacking

WHAT DOES WIRELESS NETWORK SECURITY MEAN? ❏ Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. ❏ Wireless network security is also known as wireless security. WIRELESS CONCEPTS ❏ Network technology is heading toward a new era of technological evolution through wireless technologies. ❏ Wireless networking is …

Network Hacking Read More »

penetration testing

Web application penetration testing roadmap

Introduction Today, I am going to share resources to get a kickstart in bug bounty or web  application penetration testing, followed by the history of internet, Web and Server Technology, Setting up the lab with BurpSuite and bWAPP, Mapping the application and attack surface, Understanding and exploiting OWASP top 10 vulnerabilities, Session management testing, Bypassing …

Web application penetration testing roadmap Read More »