Skip to content
CCH
  • Home
  • About Me
  • Services
  • Education
  • Recent Works
  • Contact
  • Blog
  • Free Tools
Read more about the article Wireshark Capture of VoIP/RTP

Wireshark Capture of VoIP/RTP

https://www.youtube.com/watch?v=wa_UVUKcv58 Wireshark Capture of VoIP/RTP Protocol on VBox with Host-only Networking In this mode, it is exactly like the internal mode, with the only difference being that the host computer…

Continue ReadingWireshark Capture of VoIP/RTP
Read more about the article TCP Segment Size and Congestion Window.

TCP Segment Size and Congestion Window.

If a data stream using TCP has filled the output buffer with 3600 bytes and needs to be transferred through an installed connection to a server. If the congestion window…

Continue ReadingTCP Segment Size and Congestion Window.
Read more about the article Fake Notification Bar Kali Linux (Veil-Beef)

Fake Notification Bar Kali Linux (Veil-Beef)

https://www.youtube.com/watch?v=VGmGWKAiYqo After performing certain actions, we manage to penetrate the target through the browser and then using a fake notification bar, we attempt to "convince" the target to download our…

Continue ReadingFake Notification Bar Kali Linux (Veil-Beef)
Read more about the article Website Hacking / Penetration Testing

Website Hacking / Penetration Testing

https://www.youtube.com/watch?v=NN3aUD0Kjkg Most Common Website Security Vulnerabilities SQL Injections Cross Site Scripting (XSS) Broken Authentication & Session Management Insecure Direct Object References Security Misconfiguration Cross-Site Request Forgery (CSRF) Learn More Cyber…

Continue ReadingWebsite Hacking / Penetration Testing
Copyright 2023 - Costas Ch. | Privacy Policy
  • Home
  • About Me
  • Services
  • Education
  • Recent Works
  • Contact
  • Blog
  • Free Tools