My Cybersecurity Journey
Welcome to my blog where I document my technical journey in Cybersecurity. Search for interesting articles

Enumerating a WordPress 4.6 Server: A Beginner’s Guide
WordPress is one of the most popular content management systems on the web, but its popularity also makes it a prime target for attackers. Today, we’ll be diving into the basics of enumerating a WordPress 4.6 server – a crucial step in understanding potential vulnerabilities.
Read more →

Django CVE-2019-14234: Security Vulnerability Explained and How to Protect Your Application
In this post, we dive into Django CVE-2019-14234, a security vulnerability affecting the popular web framework. Learn what this vulnerability is, how it impacts your application, and the steps you can take to secure your Django projects. Whether you’re a developer or a security enthusiast, this guide will help you understand the risks and safeguard your web applications.
Read more →

HTTP Brute Forcing with Burp Suite Intruder: A Step-by-Step Guide
Brute forcing can reveal weak authentication mechanisms, making it a crucial testing technique in web security. In this post, we explore how to perform HTTP brute forcing using Burp Suite’s Intruder module. Learn the step-by-step process, from configuring attack vectors to analyzing the results, all while staying ethical and within legal boundaries. Perfect for penetration testers and cybersecurity enthusiasts looking to enhance their web application testing skills.
Read more →