Author: Shubham Saini

rancher eks

How to deploy Rancher on the EKS cluster using Helm?

Reading Time: 3 minutes Hey readers, so today we’ll see how can we deploy Rancher on the EKS cluster using Helm. Firstly we’ll create an EKS cluster on AWS using Terraform and then we’ll deploy Rancher on EKS using Helm charts. So for that, we’ll be requiring some prerequisites. An AWS account with admin privileges AWS CLI on the local system Configured CLI with the respective AWS account Terraform Continue Reading

liquibase

How to use Liquibase with MongoDB?

Reading Time: 2 minutes Hey, tech geeks, so today we’ll be looking into how we can use Liquibase with MongoDB so that we can create a Liquibase project. So Liquibase is an open-source library that is used to track, manage and apply database schemas. It is an independent library. Installing Liquibase on Linux For installing Liquibase, Go to the official page of Liquibase to download that tar package. After Continue Reading

terratest

How to use Terratest using Packer?

Reading Time: 3 minutes Hey readers, today we’ll be looking into how we can use Terratest with Packer to test infrastructure code. So Terratest is a library based on the GO language which provides helper functions and patterns for testing the code. Terratest is developed by Gruntwork which is open source. It is used to create and automate infrastructure tests as a code portrayed in Terraform. Here we will Continue Reading

Apache Guacamole

How to Connect to AWS EC2 Instance using Guacamole?

Reading Time: 4 minutes Introduction to Guacamole Hey readers, so today we will be looking into Guacamole and how can we connect to an AWS EC2 instance using Guacamole. Apache Guacamole is free and open-source software. It is an HTML5 web application that provides access to desktop environments using different protocols. It also produces web applications and provides an API that drives them. Guacamole is most commonly used to Continue Reading

How to create a backdoor using EvilDroid?

Reading Time: 3 minutes Hey readers, today we’ll see how to create a backdoor using EvilDroid. Since Android users have increased in the last decade and this led android devices to be more prone to getting hacked and for the same we have many tools for creating payloads. Earlier we’ve seen MSF venom for the same purpose but in that, we need a host so that the data could Continue Reading

How To Use SNOW For Steganography?

Reading Time: 2 minutes Hello Readers, so here I’ll be talking about Steganography and I’ll also show you how to use the technique to hide a message into a text file using SNOW. But first of all, let’s see what Steganography is. So basically, Steganography is a technique to conceal the messages into another message. So here we can hide a message into a file, an image, an audio Continue Reading

black samsung tablet display google browser on screen

How to Use Google Dorks?

Reading Time: 3 minutes Have you guys heard about Google Hacking? Does this sound exciting to you? So let’s just deep dive into Google Dorks. Now, Google Dork, which is also known as Google Dorking or Google Hacking is a very important resource for security researchers. For most people, Google is just a search engine that helps to find videos, articles, games, images, news, and many more things. But Continue Reading

How To Use Nmap Command On Ubuntu?

Reading Time: 2 minutes The Nmap or Network Mapper is an open-source tool that is used for network discovery and security auditing. It is useful for many systems and network administrators for tasks like network inventory, managing service upgrade schedules, and monitoring host or service uptime. It uses raw IP packets in novel ways to determine what hosts are available on the network, what services those hosts are offering, Continue Reading

What Is msfvenom? How To Use It?

Reading Time: 3 minutes So when it comes to hacking a system, what basically a newbie hacker can think of. Like listening to the traffic of a particular system without getting noticed. So it needs a payload to be deployed at the target system. There comes the msfvenom. It is a combination of msfpayload and msfencode. It is fast and uses a single instance. Msfvenom contains standard command-line options. Continue Reading

What Is Ettercap? It’s Installation And Workflow.

Reading Time: 3 minutes So before talking about Ettercap, its installation, and workflow, let’s talk about the category in which it falls. Have you ever heard about MITM? No, so let me give you a brief about it. As a penetration tester or security personnel, one should know about MITM or Man In The Middle attacks. But let’s just consider that we are not one of them.We will go Continue Reading

How To Filter And Inspect Packets In Wireshark?

Reading Time: 2 minutes Here in this blog we will see how to apply Filters and inspect packets. So to apply Filters in Wireshark, we have two ways: In the Display Filter window, at the top of the screen By highlighting a packet and right-clicking on the packet Wireshark filters use key phrases as follows: ip.addr Specifies an IPv4 address ipv6.addr Specifies an IPv6 address src Source- where the Continue Reading

How To Read Color Coding In Wireshark?

Reading Time: 3 minutes In my previous blog, I explained Wireshark, Its installation, and how to use it. Now we’ll go a bit more deep into Wireshark and see how to read the captured packets. So Wireshark tries to help you identify packet types by applying common-sense color coding. Color in Wireshark Packet Type Light purple TCP Light blue UDP Black Packets with errors Light green HTTP traffic Light yellow Continue Reading

What Is Wireshark? How It Is Used And Its Installation?

Reading Time: 2 minutes Wireshark is a network protocol analyzer or an application that captures packets from a network connection, such as from your computer to your home office or the internet. The packet is the name given to a discrete unit of data in a typical Ethernet network. We’ll see the installation of Wireshark and also how to use Wireshark. Wireshark is the most often-used packet sniffer in Continue Reading