U.Y.Decoding NIST’s AI RMF (Risk Management Framework): Overview and CritiqueUnderstanding the risks of a product is crucial for all the project stakeholders, especially for those who have to approve the residual…May 10May 10
U.Y.Microsoft Threat Modeling Tool’s LogicMicrosoft Threat Modeling Tool (MS TMT) is a free threat modeling tool offered by Microsoft. In this article, I would like to draw very…Sep 3, 2020Sep 3, 2020
U.Y.Nmap -Pn (No Ping) Option AnalysisWhen we explore our target machine(s), nmap is almost the first step tool for most of us (us = pentesters, researchers, engineers, etc.)…Aug 6, 2020Aug 6, 2020
U.Y.Remote SSH Tunneling with Plink.exeWe will demonstrate how we can create a remote ssh tunneling between a Windows Machine having a blocked service and a Linux Machine (Kali…Jul 24, 2020Jul 24, 2020
U.Y.Delete vs. Clear vs. Purge vs. DestroyLet’s begin with “Delete”. Initially, “delete” was confusing for me as I was reading about data sanitization, because I normally…Jul 17, 2020Jul 17, 2020
U.Y.PII vs. PHI vs. ePHIThese terms sound all similar and create confusion. Let me start by saying that depending on their context, they all refer to the same…Jul 3, 2020Jul 3, 2020
U.Y.Structured Penetration TestingYou have learnt penetration testing, and possibly you have a certification like CEH or OSCP, but you wonder how I can be more structured…Jun 23, 2020Jun 23, 2020