top of page
Search
pragmat1c0n3
Dec 9, 20247 min read
CrowdStrike Falcon: The Ultimate Guide to Deployment, Configuration, and Administration
<Introduction> CrowdStrike Falcon has long been recognized as a cutting-edge endpoint security solution, renowned for its AI-driven...
84 views0 comments
pragmat1c0n3
Oct 2, 20247 min read
Exploring the Power of Feroxbuster: A Versatile Web Fuzzer
The toolkit of penetration testers and security enthusiasts is Feroxbuster. Developed by Ben “epi” Risher.
0 views0 comments
pragmat1c0n3
Sep 4, 202420 min read
Understanding the Phases of Penetration Testing
Introduction With cyber threats constantly morphing in today's digital landscape, organizations must prioritize the security of their...
6 views0 comments
pragmat1c0n3
Aug 9, 20246 min read
Crowdstrike: A Faulty Update with Global Reach
On July 19, 2024, a major incident occurred involving CrowdStrike's Falcon sensor software, leading to a widespread Windows outage.
6 views0 comments
pragmat1c0n3
May 14, 20243 min read
Building Trust in the Age of AI: A Brief Look at AI Security
Technology is advancing faster than ever, and the rapid integration of Artificial Intelligence (AI) is reshaping our world.
2 views0 comments
pragmat1c0n3
Jan 19, 20242 min read
API Security: Building a Foundation of Knowledge
Introduction Web application API security testing refers to the process of evaluating and assessing the security of the Application...
4 views0 comments
pragmat1c0n3
Jan 8, 20249 min read
Web Application Security Testing (WAST): A Brief Introduction
This blog post discusses Web Application Security Testing (WAST) and how it's used to identify and mitigate vulnerabilities in webapps.
7 views0 comments
pragmat1c0n3
Nov 1, 20238 min read
Insight into the Vulnerability Management Lifecycle
Introduction As a professional in the Cybersecurity field, I have extensive experience dealing with the vulnerability management...
2 views0 comments
pragmat1c0n3
Jul 2, 202313 min read
Fortifying Our Defenses: Revealing the Blueprint to A Vulnerability Management Program!
Introduction In this post, I will provide a comprehensive overview of vulnerability management programs, their purpose, and the critical...
5 views0 comments
pragmat1c0n3
Jun 11, 202313 min read
Nmap: Scan All the Things (Part Five: Secret Weapon Called NSE and Evading Detection!)
Introduction In my post on my Nmap series "Nmap: Scan All the Things" epsisode 5, I am going to be reviewing Nmap Scripting Engine (NSE)...
10 views0 comments
pragmat1c0n3
Jun 5, 20237 min read
Nmap: Scan All the Things (Part Four: Detection, Finding All the Things!)
Introduction In my final post on my Nmap series "Nmap: Scan All the Things", I am going end the series by covering Nmap detection methods...
10 views0 comments
pragmat1c0n3
May 14, 202316 min read
Nmap: Scan All the Things (Part Three: It's All about the Ports)
In part three of the Nmap: Scan all the things post, I am going to go over Nmap and its potential uses. I will cover try to provide an...
9 views0 comments
pragmat1c0n3
May 7, 20238 min read
Nmap Scan All the Things (Part Two: Unmasking the Hidden: Host Discovery)
In part two of the "Nmap: Scan All the Things" Nmap series, I will try to provide a comprehensive overview of Nmap and its capabilities....
5 views0 comments
pragmat1c0n3
Apr 30, 20238 min read
Nmap: Scan All the Things (Part One: The App, The Myth, The Legend)
Introduction This blog post is part one of five in my Nmap Scan All the Things series. I will try to extensively cover nmap and the...
7 views0 comments
bottom of page