Manjaro Linux is one of the famous Linux distributions present in the Linux world alongside big names such as Arch, Ubuntu, Fedora, and Debian. According to DistroWatch, Manjaro has the most searches beating Linux Mint and Ubuntu. Manjaro is famous for being a Stable, Speed, Vast repositories and Beginner-friendly distributions. Manjaro Linux is based on […]
Write-ups
Research articles, Personal experiences, Sprotechs write-ups.
False news spreading on social media – Investigating fake news
Social media is a source of connecting with other people. But some people think it’s a news source. The fact will not be unknown to my readers that most news shared on social media turn out to be fake. I don’t mean every news is fake. But when a news is shared without any authentic […]
How i hacked a private company & got a complete access
This is the story of how I hacked a private company and got their internal networks, user accounts, details. I was surfing around on the internet based on my daily routine. It was a cloudy day and I was really happy. This is my second article about my bug chopping experience. I decided to hunt […]
How i hacked a private website – A bad Experience
This is the story of how I hackedĀ a private website and all I got a police threat instead of saying thanks for giving bounty or their vulnerability report. It was a hot day and I was totally bored. To tackle my boredom, I decided to do some research on web security. So, I selected a […]
How can we secure our Login Process – Understanding authorized and unauthorized access
I guess every person on the internet knows about what is login? We use login processes multiple times a day. For example, I just logged into my website’s admin panel to access my dashboard and write this article. Similarly, you must log into your Facebook, Twitter, Instagram or Gmail account to get access to your […]
pop-up XSS using open redirect
Cross-Site Scripting attacks are mostly used to inject malicious scripts to infect users, in short, we can also say it XSS. The attacker injects it in trusted websites, so the user ignores threats and visits the link. An attacker can get access to user cookies, hook browsers, redirect users to malicious websites and perform many […]
Safety from Cyber Attacks – Steps that can reduce cyber threats
Cyber attacks are the biggest threat of the present time. Especially if you’re running a business, you need to take care of your network security. According to a survey, a cyber attack takes place in any part of the world every 3 seconds. Another survey report says that 59% of the data breaches happen due […]