top of page
Search


Active Reconnaissance Decoded: An Essential for Assessing a Target
In this blog post I will examine the methodologies underpinning active reconnaissance, emphasizing the strategic role it plays in the pentesting framework. I will examine some tools and techniques employed to engage target hosts effectively.
pragmat1c0n3
Aug 60 min read


Nessus Essentials - Installation Made Simple: Scan Your Network Like a Pro for Beginners
In this blog post, I’ll explore the world of vulnerability scanning using Nessus Essentials.
pragmat1c0n3
Feb 208 min read


PenTesting - Basic Active Reconnaissance Cheat Sheet
Pentesting is a critical practice in cybersecurity involving simulated cyberattacks to uncover vulnerabilities in an organization IT space.
pragmat1c0n3
Feb 35 min read


Exploring the Power of Feroxbuster: A Versatile Web Fuzzer
The toolkit of penetration testers and security enthusiasts is Feroxbuster. Developed by Ben “epi” Risher.
pragmat1c0n3
Oct 2, 20247 min read


Understanding the Phases of Penetration Testing
Introduction With cyber threats constantly morphing in today's digital landscape, organizations must prioritize the security of their...
pragmat1c0n3
Sep 4, 202420 min read


Crowdstrike: A Faulty Update with Global Reach
On July 19, 2024, a major incident occurred involving CrowdStrike's Falcon sensor software, leading to a widespread Windows outage.
pragmat1c0n3
Aug 9, 20246 min read


Building Trust in the Age of AI: A Brief Look at AI Security
Technology is advancing faster than ever, and the rapid integration of Artificial Intelligence (AI) is reshaping our world.
pragmat1c0n3
May 14, 20243 min read


API Security: Building a Foundation of Knowledge
Introduction Web application API security testing refers to the process of evaluating and assessing the security of the Application...
pragmat1c0n3
Jan 19, 20242 min read


Web Application Security Testing (WAST): A Brief Introduction
This blog post discusses Web Application Security Testing (WAST) and how it's used to identify and mitigate vulnerabilities in webapps.
pragmat1c0n3
Jan 8, 20249 min read


Insight into the Vulnerability Management Lifecycle
Introduction As a professional in the Cybersecurity field, I have extensive experience dealing with the vulnerability management...
pragmat1c0n3
Nov 1, 20238 min read


Fortifying Our Defenses: Revealing the Blueprint to A Vulnerability Management Program!
Introduction In this post, I will provide a comprehensive overview of vulnerability management programs, their purpose, and the critical...
pragmat1c0n3
Jul 2, 202313 min read


Nmap: Scan All the Things (Part Five: Secret Weapon Called NSE and Evading Detection!)
Introduction In my post on my Nmap series "Nmap: Scan All the Things" epsisode 5, I am going to be reviewing Nmap Scripting Engine (NSE)...
pragmat1c0n3
Jun 11, 202313 min read


Nmap: Scan All the Things (Part Four: Detection, Finding All the Things!)
Introduction In my final post on my Nmap series "Nmap: Scan All the Things", I am going end the series by covering Nmap detection methods...
pragmat1c0n3
Jun 5, 20237 min read


Nmap: Scan All the Things (Part Three: It's All about the Ports)
In part three of the Nmap: Scan all the things post, I am going to go over Nmap and its potential uses. I will cover try to provide an...
pragmat1c0n3
May 14, 202316 min read


Nmap Scan All the Things (Part Two: Unmasking the Hidden: Host Discovery)
In part two of the "Nmap: Scan All the Things" Nmap series, I will try to provide a comprehensive overview of Nmap and its capabilities....
pragmat1c0n3
May 7, 20238 min read


Nmap: Scan All the Things (Part One: The App, The Myth, The Legend)
Introduction This blog post is part one of five in my Nmap Scan All the Things series. I will try to extensively cover nmap and the...
pragmat1c0n3
Apr 30, 20238 min read
bottom of page