Friday, December 6, 2024
Home Offensive

Offensive

Here, you’ll find practical tips, theoretical lessons, and in-depth guides on ethical hacking.

- Advertisement -
Google search engine

RECENT

SIMILAR

LDAP Explained

ldap-image
0
LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage directory services over a network. It is commonly used to authenticate users, query user information, and manage resources in a hierarchical directory structure, such as AD. LDAP enables centralized management of...

Regex (Regular Expressions)

0
Regex (short for Regular Expressions) is a powerful tool used for searching, matching, and manipulating text based on specific patterns. Understanding and mastering this tool involves learning its syntax, operators, and advanced features. Basics Literals Match exact characters. E.g. ‘cat’ matches the string “cat” Metacharacters Special characters with unique meanings MetacharacterMeaning.Matches...

Difference between Proxy and Gateway

0
A proxy acts as an intermediary between a client and a server, it’s very often used for filtering, caching, and logging web requests. Types Forward Proxy - Used by clients to access the internet, it hides the client’s IP address. E.g. Filtering employee internet traffic. Reverse Proxy...