Security Findings
About

Posts

  • Feb 28, 2022

    Using Netstat Command

  • Feb 28, 2022

    Hashing Algorithms What it is? and How to identify

  • Apr 8, 2020

    Token Imporsanate With Meterpreter Shell

  • Mar 11, 2020

    Use MSSQL To Execute System Commands

  • Mar 5, 2020

    Exploiting Eternalblue using Metesploit

  • Mar 1, 2020

    PHP Command Execution Vulnerability

  • Feb 29, 2020

    Convert Normal Shell Into Meterpreter Shell Using Unicorn (By TrustedSec)

  • Feb 18, 2020

    Finding Passwords Hidden In Images (Steganography)

  • Feb 15, 2020

    Linux Privilage Escalation

  • Feb 12, 2020

    Drop SSH Key To Get a Normal Shell

  • Feb 12, 2020

    Using LFI and SMTP to Get a Reverse Shell

  • Jan 30, 2020

    Android mobile application pentesting guide

  • Jan 17, 2020

    Zip File Password Cracking

  • Nov 30, 2019

    Port Forwarding Fun!

  • Apr 30, 2019

    Configure ELK Stack to monitor web server

  • Apr 29, 2019

    Dump database using error based SQL injection!

  • Feb 23, 2019

    Getting Windows 7 Reverse Shell Using Nishang

subscribe via RSS

Security Findings

  • Security Findings
  • itjanith@gmail.com
  • janithmalinga
  • janithSmalinga

Cyber security is a vast and a volatile feild. Always the technology is changing. We can not servive alone. Sharing knowledge is the main advantage for us white hat hackers. This site is for sharing knowledge. My main research area are Application Security, Network Security Monitoring and Forensic Analysis.