ExploringOTP

What is second factor authentication? The code which we enter after entering username and password, how does this work ? In this blog post will be exploring how one time password/passcode (OTP) works. Will start with what is included in standard on OTP and then implementing this using python code. ...

June 29, 2020 · 5 min

Analyze WannaCry Ransomware with Diamond Model

In this blog post, will explore how wanna cry ransomware event can be mapped with Diamond model. ...

June 28, 2020 · 2 min

Diamond Model - Intrusion Analysis

Diamond model for intrusion analysis is used to analyze threats. It helps to set a structure and flow to threats so that analysts can control its effects. It may not be complete but sufficient enough to control the impact. ...

June 20, 2020 · 3 min

Simple git reference

Simple reference to basic git commands, ...

June 20, 2020 · 1 min

CISSP Certification - My notes

You might have already come across this quote on CISSP preparation, “Its a mile wide and a inch deep” , ...

January 14, 2020 · 4 min

Exploring Digital Signatures

Notes on Digital Signatures using openssl Here is a short blog post on digital signatures and how public and private key works. ...

June 4, 2019 · 2 min