VISHRANT KHANNAinStudents in InfoSecBest Colleges/Universities for Cyber Security in India [2021]DISCLAIMER: I’m not endorsing any university in this article. The selection of these universities is based on my own experience and…Dec 22, 2020Dec 22, 2020
VISHRANT KHANNAinStudents in InfoSecInjecting Payload into an Android Application | Msfvenom (TheFatRat) TutorialMsfvenom is a command-line instance of Metasploit that is used to generate and output all of the various types of shellcode that are…Sep 25, 2020Sep 25, 2020
VISHRANT KHANNAinStudents in InfoSecHow to Perform a Deauthentication Attack | MDK4 TutorialMDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.Sep 7, 2020Sep 7, 2020
VISHRANT KHANNAinStudents in InfoSecHow to Create a Wordlist for a Dictionary Attack | Crunch TutorialCrunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all…Aug 31, 2020Aug 31, 2020
VISHRANT KHANNAinStudents in InfoSecInstalling Postman on Kali Linux [2020]Postman is a tool popular among developers for testing APIs.Aug 25, 2020Aug 25, 2020
VISHRANT KHANNAinStudents in InfoSecHow to Find the Password of a WiFi Network | AirCrack-ng TutorialAircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP, and WPA/WPA2-PSK cracker and analysis tool for…Aug 24, 2020Aug 24, 2020
VISHRANT KHANNAinStudents in InfoSecHow to extract GPS coordinates of an Image | Exif Tool TutorialThe world collectively takes 14 trillion photos annually.Apr 14, 2019Apr 14, 2019