This script first sets the name of the database, the username and password used to connect to the database, the directory where the backup file will be saved, and the filename of the backup…
In a traditional client-server environment, the user is the client and the machine that provides services is the server. The client creates a connection, to the server which is listening for…
The Pi 400 makes creating a hacking system with Raspberry Pi extremely simple – it is literally burn, boot and done! The Pi 400 is an “all in one” keyboard version of the Raspberry Pi 4. For…
Overview QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on “Login with QR code”…
Crafting the E-Mail The first thing we need to do is craft a Social Engineering e-mail to entice our corporate targets. Some may use cute puppy pics, or cat videos are always popular. As our…
When you launch an Amazon EC2 instance, you define an Amazon EBS volume size. However, you may eventually need more disk space later for some reason. In this blog post, I will demonstrate an…
The sudo command is the most powerful command in Linux. It provides a mechanism for granting administrator privileges, using administrator privileges a normal user can do…
This article introduces a technique that helps you with debugging running Pods in production. By changing labels, you can detach Pods from the Service (no traffic), and you troubleshoot them…
Node.js is an open-source, cross-platform, back-end JavaScript runtime environment that runs on a JavaScript Engine (i.e. V8 engine) which was designed to build scalable backend…
Prerequisites Before starting the project you should have these things in your system. Step 1 : Run Locally Before deploying the app on AWS, we will test run the app locally. git clone…