Win Stark Archive
+
Before go ahead to subjack tool, let’s take a brief about what is subdomain takeover What is Sudomain takeover ? Subdomain takeover vulnerabilities occur when a …
By Win Stark
June 6, 2018
+
Kubernetes architecutre Before we go in kubenetes(aka k8s) architecture, let’s start with question What is container orchestration ? Container archestration refers to the automated arrangement, coordination, …
By Win Stark
March 28, 2018
+
Kubernetes basic knowledge When the first time I use Kubernetes, I was in trouble to understand some kind of new defintions like node, cluster, deployment, etc. …
By Win Stark
March 14, 2018
+
Block Cryptocurrency Mining In Your Web Browser Crytocurrency is a trend now and browser-based cyrtocurrency mining is not new. Mining scripts embbed is the websites you …
By Win Stark
February 24, 2018
+
Network Tunneling Knowing how to identify and understand network tunneling traffic is key when attempting to prevent data loss. In this blog, we’ll examine covert network …
By Win Stark
December 17, 2017
+
Top 10 useful Burp Suite extesions Burp Suite is powerfull tools for pentester and security researcher.But’s if you’re only using the stock verion, as great as …
By Win Stark
December 16, 2017
+
Metasploit meterpreter command cheat sheet 1. Core Commands ? - help menu background - moves the current session to the background bgkill - kills a background …
By Win Stark
December 16, 2017
+
We’re all heard too much about bitcoin, ethereum and others on the media. And the technology behind all them is blockchain. So what is this ? …
By Win Stark
December 5, 2017