Open in app

Sign In

Write

Sign In

Noureldin Ehab | Creeper.exe
Noureldin Ehab | Creeper.exe

138 Followers

Home

About

Pinned

CVE-2021–40444 MSHTML vulnerability (RCE)

Microsoft MSHTML Remote Code Execution Vulnerability — Technical Explanation (According to Microsoft) The exploit document uses an external oleObject relationship to embed exploitative JavaScript within MIME HTML remotely hosted content that results in (1) the download of a CAB file containing a DLL bearing an INF file extension, (2) decompression of that CAB file, and (3) execution of a function within that…

Cve

3 min read

CVE-2021–40444 MSHTML vulnerability (RCE)
CVE-2021–40444 MSHTML vulnerability (RCE)
Cve

3 min read


Jan 24

Cryptography Through The Ages (Part 2)

From Scytale to Quantum-Safe Cryptography Introduction In the last blog, we saw how the science of cryptography started, and why we needed such a science and we also saw ancient cryptographic ciphers and how symmetric encryption works. In this blog, we will take a look at modern cryptography and how they…

Cryptography

10 min read

Cryptography Through The Ages (Part 2)
Cryptography Through The Ages (Part 2)
Cryptography

10 min read


Dec 15, 2022

AWS AppConfig Extensions

Introduction AWS AppConfig is an AWS service that enables customers to manage and deploy their applications with confidence. AppConfig helps customers build and deploy applications that are well-configured, secure, and compliant. …

AWS

3 min read

AWS AppConfig Extensions
AWS AppConfig Extensions
AWS

3 min read


Dec 14, 2022

Cryptography Through The Ages (Part 1)

From Scytale to Quantum-Safe Cryptography Introduction

Cryptography

8 min read

Cryptography Through The Ages (Part 1)
Cryptography Through The Ages (Part 1)
Cryptography

8 min read


Dec 7, 2022

What is AWS AppConfig?

AWS AppConfig for Quick, Secure, and Simple Deployment — Introduction Let's imagine you are a developer and you wanna make a change to your application, you have two options you can release an update or make application configuration changes, in both cases you may have to restart the application so the changes take effect. As you see this isn't the…

AWS

4 min read

What is AWS AppConfig?
What is AWS AppConfig?
AWS

4 min read


Sep 8, 2022

What Are Sock Puppet Accounts

I had this question a while back when I noticed that I have been interacting with a sock puppet account for years, I wondered what made it so real?! First, we need to understand What are sock puppet accounts? Sock puppets are fake accounts created to look real, you might think it is easy but…

Cybersecurity

2 min read

What Are Sock Puppet Accounts
What Are Sock Puppet Accounts
Cybersecurity

2 min read


Sep 7, 2022

Secure by Design: How Can UX Protect Your Data

Introduction What is User Experience (UX) Design? According to Adobe UX design is the process of creating products (digital or physical) that are practical and usable. Peter Morville’s UX honeycomb breaks down the ideal characteristics even further: Usable: A product needs to be simple, easy to use, and familiar. Useful: A…

Cybersecurity

2 min read

Secure by Design: How Can UX Protect Your Data
Secure by Design: How Can UX Protect Your Data
Cybersecurity

2 min read


Sep 5, 2022

How to pass the AWS Security Specialty exam?

First, we need to know why would we want to be AWS Certified Security Specialists. Why would you even want to take this certificate? As you might know, Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully-featured services from data centers globally. …

Cybersecurity

3 min read

How to pass the AWS Security Specialty exam?
How to pass the AWS Security Specialty exam?
Cybersecurity

3 min read


Sep 4, 2022

AWS security best practices for non-security professionals

First, we need to understand what makes a system secure. To say that something got hacked we need to break one of the 3 diagonals of the CIA triad (Confidentiality, Integrity, Availability)

AWS

2 min read

AWS security best practices for non-security professionals
AWS security best practices for non-security professionals
AWS

2 min read


Aug 19, 2022

Introduction to the MITRE ATT&CK Framework

What is the MITRE ATT&CK Framework? — WhoAmI Hey, I am Nour I am a Software engineering student, and here are some of the communities that I am part of: IBM Community leader and IBMZ Student Ambassador AWS Community Builder Microsoft Student Ambassador also, I love solving and creating OSINT CTFs at @Hacktoria connect with me on LinkedIn…

Mitre Attack

4 min read

Introduction to the MITRE ATT&CK Framework
Introduction to the MITRE ATT&CK Framework
Mitre Attack

4 min read

Noureldin Ehab | Creeper.exe

Noureldin Ehab | Creeper.exe

138 Followers

Software Engineering Student | Cyber Security Enthusiast

Following
  • Thexssrat

    Thexssrat

  • Kevin Beaumont

    Kevin Beaumont

  • Medusa

    Medusa

  • Cristi Vlad

    Cristi Vlad

  • Mohamed Eassa

    Mohamed Eassa

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech