+91 9116117170


What is Blockchain Technology?

By Shouvik Dutta 0 Comment May 12, 2021

Blockchain Technology is a hot topic in the tech world. Nobody really knows what the tech is or how it works – but everybody’s talking about it! In a nutshell, blockchain is a decentralized technology that’s been developed to make transactions more secure. First things first: you can’t talk about blockchain-based networks without mentioning Bitcoin. […]

Cracking Hashes

How to Crack Hashes?

By Vedant Jain 0 Comment May 10, 2021

Today we are going to learn how to crack some hashes we can also learn how to make a difference in a penetration testing assignment or during bug bounty hunting by taking advantage of leaks or web application vulnerabilities or something that can give us access to a list of hashes and sometimes we can […]


What is IMSI-Catcher ?

By Shouvik Dutta 0 Comment May 10, 2021

An IMSI catcher is a cell phone surveillance device that acts as an improvised fake base station. With an IMSI catcher, law enforcement can impersonate a telecommunications company in order to track the location of a target mobile phone, monitor its calls and text messages, and intercept data traffic to gather information about the individual […]

What is Kubernetes ?

By Shouvik Dutta 0 Comment May 5, 2021

Talking about the Kubernetes then, it’s the best application for containers. What is Kubernetes? Kubernetes is an open-source application that’s been built by Google for the Spinnaker continuous delivery platform. It’s a container deployment system which enables easy management, scaling, and more for containerized applications across clusters of hosts. It’s a tool that makes your […]

cloud pentesting

Cloud Penetration Testing

By Shouvik Dutta 0 Comment April 27, 2021

What is Cloud Penetration Testing? Cloud Penetration Testing is an authorized simulated cyber-attack against a system that’s hosted on a Cloud platform, e.g. Amazon’s AWS or Microsoft’s Azure. The primary goal of a cloud penetration take a look at is to search out the weaknesses and strengths of a system, so its security posture are […]

error: Content is protected by Cyberops !!