
Tag: SMTP




A password attack is an attempt to gain unauthorized access to a system by cracking or guessing a user’s credentials. One of the most common methods used in password attacks is brute force, where an attacker systematically tries different password combinations until they find the correct one.…


Keypoints :
Networks enable devices to communicate based on established rules.…



Keypoints :
Nmap is used for network probing, service discovery, and operating system identification.…


𝐏𝐫𝐞-𝐫𝐞𝐪𝐮𝐢𝐬𝐢𝐭𝐞𝐬
Introduction to Malware Analysis https://github.com/0xrajneesh/Malware-Analysis-Projects-for-Beginners/blob/main/Introduction-to-Malware-Analysis.md
Malware Analyst Guide 2024 https://youtu.be/tUsx0I0TK54
𝐌𝐚𝐥𝐰𝐚𝐫𝐞 𝐀𝐧𝐚𝐥𝐲𝐬𝐢𝐬 𝐏𝐫𝐨𝐣𝐞𝐜𝐭𝐬
Static Analysis of a Simple Malware Sample https://github.com/0xrajneesh/Malware-Analysis-Projects-for-Beginners/blob/main/Project Static Analysis of a Simple Malware Sample.md
Analyzing FTP Log Files Using Splunk SIEM https://github.com/0xrajneesh/Splunk-Projects-For-Beginners/blob/main/project%232-analyzing-ftp-logs-using-splunk-siem.md
Analyzing HTTP Log Files Using Splunk SIEM https://github.com/0xrajneesh/Splunk-Projects-For-Beginners/blob/main/project%233-analyzing-http-logs-using-splunk-siem.md
…

Keypoints :
The box “Escape” is rated Medium and is the author’s first Active Directory machine.…
Keypoints :
Ivanti disclosed two high-severity vulnerabilities (CVE-2025–0282, CVE-2025–0283) affecting its products.…