top of page
Search


pragmat1c0n3
Nov 140 min read


pragmat1c0n3
Oct 310 min read


From Scan to Strategy: A Complete Guide to Vulnerability Analysis
This comprehensive guide will walk you through the essential steps of vulnerability analysis, transforming raw scan data into actionable security intelligence.
pragmat1c0n3
Oct 200 min read


Active Reconnaissance Decoded: An Essential for Assessing a Target
In this blog post I will examine the methodologies underpinning active reconnaissance, emphasizing the strategic role it plays in the pentesting framework. I will examine some tools and techniques employed to engage target hosts effectively.
pragmat1c0n3
Aug 60 min read


Nessus Essentials - Installation Made Simple: Scan Your Network Like a Pro for Beginners
In this blog post, I’ll explore the world of vulnerability scanning using Nessus Essentials.
pragmat1c0n3
Feb 208 min read


PenTesting - Basic Active Reconnaissance Cheat Sheet
Pentesting is a critical practice in cybersecurity involving simulated cyberattacks to uncover vulnerabilities in an organization IT space.
pragmat1c0n3
Feb 35 min read


Exploring the Power of Feroxbuster: A Versatile Web Fuzzer
The toolkit of penetration testers and security enthusiasts is Feroxbuster. Developed by Ben “epi” Risher.
pragmat1c0n3
Oct 2, 20247 min read


Understanding the Phases of Penetration Testing
Introduction With cyber threats constantly morphing in today's digital landscape, organizations must prioritize the security of their...
pragmat1c0n3
Sep 4, 202420 min read


Crowdstrike: A Faulty Update with Global Reach
On July 19, 2024, a major incident occurred involving CrowdStrike's Falcon sensor software, leading to a widespread Windows outage.
pragmat1c0n3
Aug 9, 20246 min read


Building Trust in the Age of AI: A Brief Look at AI Security
Technology is advancing faster than ever, and the rapid integration of Artificial Intelligence (AI) is reshaping our world.
pragmat1c0n3
May 14, 20243 min read


API Security: Building a Foundation of Knowledge
Introduction Web application API security testing refers to the process of evaluating and assessing the security of the Application...
pragmat1c0n3
Jan 19, 20242 min read


Web Application Security Testing (WAST): A Brief Introduction
This blog post discusses Web Application Security Testing (WAST) and how it's used to identify and mitigate vulnerabilities in webapps.
pragmat1c0n3
Jan 8, 20249 min read


Insight into the Vulnerability Management Lifecycle
Introduction As a professional in the Cybersecurity field, I have extensive experience dealing with the vulnerability management...
pragmat1c0n3
Nov 1, 20238 min read


Fortifying Our Defenses: Revealing the Blueprint to A Vulnerability Management Program!
Introduction In this post, I will provide a comprehensive overview of vulnerability management programs, their purpose, and the critical...
pragmat1c0n3
Jul 2, 202313 min read


Nmap: Scan All the Things (Part Five: Secret Weapon Called NSE and Evading Detection!)
Introduction In my post on my Nmap series "Nmap: Scan All the Things" epsisode 5, I am going to be reviewing Nmap Scripting Engine (NSE)...
pragmat1c0n3
Jun 11, 202313 min read
bottom of page









