top of page
Search

pragmat1c0n3
Feb 208 min read
Nessus Essentials - Installation Made Simple: Scan Your Network Like a Pro for Beginners
In this blog post, I’ll explore the world of vulnerability scanning using Nessus Essentials.
1 view
0 comments

pragmat1c0n3
Feb 35 min read
PenTesting - Basic Active Reconnaissance Cheat Sheet
Pentesting is a critical practice in cybersecurity involving simulated cyberattacks to uncover vulnerabilities in an organization IT space.
0 views
0 comments


pragmat1c0n3
Dec 9, 20247 min read
CrowdStrike Falcon: The Ultimate Guide to Deployment, Configuration, and Administration
<Introduction> CrowdStrike Falcon has long been recognized as a cutting-edge endpoint security solution, renowned for its AI-driven...
216 views
0 comments

pragmat1c0n3
Oct 2, 20247 min read
Exploring the Power of Feroxbuster: A Versatile Web Fuzzer
The toolkit of penetration testers and security enthusiasts is Feroxbuster. Developed by Ben “epi” Risher.
1 view
0 comments

pragmat1c0n3
Sep 4, 202420 min read
Understanding the Phases of Penetration Testing
Introduction With cyber threats constantly morphing in today's digital landscape, organizations must prioritize the security of their...
7 views
0 comments


pragmat1c0n3
Aug 9, 20246 min read
Crowdstrike: A Faulty Update with Global Reach
On July 19, 2024, a major incident occurred involving CrowdStrike's Falcon sensor software, leading to a widespread Windows outage.
6 views
0 comments

pragmat1c0n3
May 14, 20243 min read
Building Trust in the Age of AI: A Brief Look at AI Security
Technology is advancing faster than ever, and the rapid integration of Artificial Intelligence (AI) is reshaping our world.
2 views
0 comments


pragmat1c0n3
Jan 19, 20242 min read
API Security: Building a Foundation of Knowledge
Introduction Web application API security testing refers to the process of evaluating and assessing the security of the Application...
6 views
0 comments

pragmat1c0n3
Jan 8, 20249 min read
Web Application Security Testing (WAST): A Brief Introduction
This blog post discusses Web Application Security Testing (WAST) and how it's used to identify and mitigate vulnerabilities in webapps.
7 views
0 comments


pragmat1c0n3
Nov 1, 20238 min read
Insight into the Vulnerability Management Lifecycle
Introduction As a professional in the Cybersecurity field, I have extensive experience dealing with the vulnerability management...
2 views
0 comments

pragmat1c0n3
Jul 2, 202313 min read
Fortifying Our Defenses: Revealing the Blueprint to A Vulnerability Management Program!
Introduction In this post, I will provide a comprehensive overview of vulnerability management programs, their purpose, and the critical...
5 views
0 comments

pragmat1c0n3
Jun 11, 202313 min read
Nmap: Scan All the Things (Part Five: Secret Weapon Called NSE and Evading Detection!)
Introduction In my post on my Nmap series "Nmap: Scan All the Things" epsisode 5, I am going to be reviewing Nmap Scripting Engine (NSE)...
12 views
0 comments

pragmat1c0n3
Jun 5, 20237 min read
Nmap: Scan All the Things (Part Four: Detection, Finding All the Things!)
Introduction In my final post on my Nmap series "Nmap: Scan All the Things", I am going end the series by covering Nmap detection methods...
10 views
0 comments

pragmat1c0n3
May 14, 202316 min read
Nmap: Scan All the Things (Part Three: It's All about the Ports)
In part three of the Nmap: Scan all the things post, I am going to go over Nmap and its potential uses. I will cover try to provide an...
9 views
0 comments


pragmat1c0n3
May 7, 20238 min read
Nmap Scan All the Things (Part Two: Unmasking the Hidden: Host Discovery)
In part two of the "Nmap: Scan All the Things" Nmap series, I will try to provide a comprehensive overview of Nmap and its capabilities....
5 views
0 comments

pragmat1c0n3
Apr 30, 20238 min read
Nmap: Scan All the Things (Part One: The App, The Myth, The Legend)
Introduction This blog post is part one of five in my Nmap Scan All the Things series. I will try to extensively cover nmap and the...
7 views
0 comments
bottom of page