Running containers with docker-compose

As promised in the previous post here, today we will go over running containers with docker-compose. We will use the same source code(react covid dashboard) as in the last post. So, if you want to follow along you can use the same. Below is the docker-compose.yml file from the repo. Unfortunately, I couldn’t get this […]

Physical security for your network/data center.

Before considering applying access control lists, firewalls and other such controls to protect your network, we must consider physical security. Because, if an adversity can easily access and tamper our devices physically, what is the point of other controls? In this post we will dive in to physical security for your network. Physical Security Categorization […]

2014 CySCA Om Nom Nom

This penetration test assignment is done for the OM NOM NOM NOM Challenge of CYSCA2014. When we hear the term OM NOM NOM NOM what comes to our mind, is that that is the sound made by the cookie monster on the “Sesame Street” TV show. So this could be something to do with cookies. […]

Pingsweeping – How and why?

Pingsweeping – Intro & usage. Assume that you are a burglar and you want to steal. Then your first goal will be to identify your targets. Similarly, in the context of hacking, the first thing a hacker needs to do is identify the target hosts. In order to do so they send ICMP requests (pings) […]