I hacked my First Machine

I’ve successfully rooted this machine. I won this machine. It’s my machine now. This is my first rooted machine. & I’m Awesome! #penetrationtesting #CyberSecurity #infosec #pentesting #Hacking I'll post with the procedure - "How I owned the machine".

July 29, 2023 · 1 min · 0xShakhawat

Authentication :: Cybersecurity

When users have stated their identity, it is necessary to validate that they are the rightful owners of that identity. This process of verifying or proving the user’s identification is known as authentication. “Access control process validating that the identity being claimed by a user or entity is known to the system, by comparing one (single-factor or SFA) or more (multi-factor authentication or MFA) factors of identification” Simply put, authentication is a process to prove the identity of the requestor....

December 26, 2022 · 2 min · 0xShakhawat