Author: Shubham Saini

How To Use Cloud Nuke?

Reading Time: 3 minutes So if we talk about Infrastructure as a Code(IAC), we know it is the best way to bundle your infra as a code. And for that purpose, we generally use terraform as it is easy and open source and used by folks worldwide. Sometimes we forget to clean up the resources we have created in our cloud environment and that may lead up to using Continue Reading

How to Check for Valid Scripts in GitLab?

Reading Time: 3 minutes Hello readers, so today we will look that how can we validate scripts in GitLab. Here we are talking about bash scripts and python scripts. Both of these types of scripts have different syntaxes. So we’ll just verify the scripts whenever a push event occurs in GitLab. Prerequisites A GitLab account Git Installed on local Bash & Python scripts in GitLab repo Code So in Continue Reading

Expertise Augmentation

How Google Istio is different from AWS App Mesh?

Reading Time: 4 minutes Hello readers, so before going into the difference between AWS App Mesh and Google Istio, initially we should know what is a Service Mesh. The concept of service has risen over a couple of years and we have a lot of alternatives. We have a number of options to choose from, i.e. Linkerd by Buoyant Envoy by Lyft Istio was Initially by Lyft, IBM, Google Continue Reading

rancher eks

How to deploy Rancher on the EKS cluster using Helm?

Reading Time: 3 minutes Hey readers, so today we’ll see how can we deploy Rancher on the EKS cluster using Helm. Firstly we’ll create an EKS cluster on AWS using Terraform and then we’ll deploy Rancher on EKS using Helm charts. So for that, we’ll be requiring some prerequisites. An AWS account with admin privileges AWS CLI on the local system Configured CLI with the respective AWS account Terraform Continue Reading

liquibase

How to use Liquibase with MongoDB?

Reading Time: 2 minutes Hey, tech geeks, so today we’ll be looking into how we can use Liquibase with MongoDB so that we can create a Liquibase project. So Liquibase is an open-source library that is used to track, manage and apply database schemas. It is an independent library. Installing Liquibase on Linux For installing Liquibase, Go to the official page of Liquibase to download that tar package. After Continue Reading

terratest

How to use Terratest using Packer?

Reading Time: 3 minutes Hey readers, today we’ll be looking into how we can use Terratest with Packer to test infrastructure code. So Terratest is a library based on the GO language which provides helper functions and patterns for testing the code. Terratest is developed by Gruntwork which is open source. It is used to create and automate infrastructure tests as a code portrayed in Terraform. Here we will Continue Reading

Apache Guacamole

How to Connect to AWS EC2 Instance using Guacamole?

Reading Time: 4 minutes Introduction to Guacamole Hey readers, so today we will be looking into Guacamole and how can we connect to an AWS EC2 instance using Guacamole. Apache Guacamole is free and open-source software. It is an HTML5 web application that provides access to desktop environments using different protocols. It also produces web applications and provides an API that drives them. Guacamole is most commonly used to Continue Reading

How to create a backdoor using EvilDroid?

Reading Time: 3 minutes Hey readers, today we’ll see how to create a backdoor using EvilDroid. Since Android users have increased in the last decade and this led android devices to be more prone to getting hacked and for the same we have many tools for creating payloads. Earlier we’ve seen MSF venom for the same purpose but in that, we need a host so that the data could Continue Reading

How To Use SNOW For Steganography?

Reading Time: 2 minutes Hello Readers, so here I’ll be talking about Steganography and I’ll also show you how to use the technique to hide a message into a text file using SNOW. But first of all, let’s see what Steganography is. So basically, Steganography is a technique to conceal the messages into another message. So here we can hide a message into a file, an image, an audio Continue Reading

black samsung tablet display google browser on screen

How to Use Google Dorks?

Reading Time: 3 minutes Have you guys heard about Google Hacking? Does this sound exciting to you? So let’s just deep dive into Google Dorks. Now, Google Dork, which is also known as Google Dorking or Google Hacking is a very important resource for security researchers. For most people, Google is just a search engine that helps to find videos, articles, games, images, news, and many more things. But Continue Reading

How To Use Nmap Command On Ubuntu?

Reading Time: 2 minutes The Nmap or Network Mapper is an open-source tool that is used for network discovery and security auditing. It is useful for many systems and network administrators for tasks like network inventory, managing service upgrade schedules, and monitoring host or service uptime. It uses raw IP packets in novel ways to determine what hosts are available on the network, what services those hosts are offering, Continue Reading

What Is msfvenom? How To Use It?

Reading Time: 3 minutes So when it comes to hacking a system, what basically a newbie hacker can think of. Like listening to the traffic of a particular system without getting noticed. So it needs a payload to be deployed at the target system. There comes the msfvenom. It is a combination of msfpayload and msfencode. It is fast and uses a single instance. Msfvenom contains standard command-line options. Continue Reading

What Is Ettercap? It’s Installation And Workflow.

Reading Time: 3 minutes So before talking about Ettercap, its installation, and workflow, let’s talk about the category in which it falls. Have you ever heard about MITM? No, so let me give you a brief about it. As a penetration tester or security personnel, one should know about MITM or Man In The Middle attacks. But let’s just consider that we are not one of them.We will go Continue Reading