Welcome To My Blog.
Welcome my friends. I've created this blog for the beginners who are studying Ethical Hacking & Penetration Testing Methodologies . When I was a beginner studying Ethical Hacking & Penetration Testing, I had some difficulties with few techniques and tools and I had to google them. But sometimes, answers are not so beginners' friendly. So, I decided to create beginners' friendly tutorials that everyone can understand easily. I will try to explain every tools and techniques I use in the tutorials as clearly as I can. Actually I don't want to name "Tutorials" for the posts in this blog. So , let's just keep them as the beginners' study companion. I'll be using Kali Linux as my attacker machine. I'll use some beginners' friendly Vulnerable CTF Machines (Capture the flag) as targets. Both of my attacker machines and targets machines are in VMware workstation. You can use any Hypervisors you feels comfortable w