Archives
All the articles I've archived.
-
Incident Response Playbooks for Security Engineers
Master incident response for security engineering roles. Learn IR phases, ready-to-use playbooks for common scenarios, and communication templates for security interviews.
-
Threat Modeling for Security Engineers
Master threat modeling for security engineering roles. Learn STRIDE, PASTA, attack trees, and practical exercises to identify security risks before they become vulnerabilities.
-
Securing CI/CD Pipelines: A Security Engineer's Guide
Master CI/CD pipeline security for DevSecOps roles. Learn pipeline attack vectors, GitHub Actions security, secrets management, and supply chain protection for security interviews.
-
Detection Engineering Basics for Security Engineers
Learn detection engineering fundamentals for SOC and security roles. Master Sigma rules, MITRE ATT&CK mapping, SIEM queries, and the detection development lifecycle for security interviews.
-
Burp Suite Professional Workflow for Security Engineers
Master professional Burp Suite workflows for web application security testing. Learn advanced features, essential extensions, automation techniques, and interview-ready methodologies.
-
Active Directory Forest and Trust Attacks
Master AD forest and trust attacks for enterprise pentests. Learn trust types, cross-forest attack paths, SID history abuse, and detection strategies for security interviews.
-
Linux Privilege Escalation Guide
A comprehensive reference guide covering Linux privilege escalation techniques for GPEN and penetration testing preparation.
-
Active Directory Attack Path: From Domain User to Domain Admin
A beginner-friendly guide to compromising Active Directory. Step-by-step attack phases from enumeration to domain dominance, with commands and expected outputs.
-
API Pentesting Cheat Sheet: Hands-On Commands for OWASP API Top 10
A practical command reference for testing API vulnerabilities. Step-by-step techniques for BOLA, JWT attacks, BFLA, SSRF, GraphQL exploitation, and more.
-
API Penetration Testing: OWASP API Security Top 10 (2023) Explained
A practical breakdown of the OWASP API Security Top 10 vulnerabilities, real-world breach analysis, and the methodology I use for API pentesting engagements.
-
Windows Privilege Escalation Guide
A comprehensive reference guide covering Windows privilege escalation techniques for GPEN and penetration testing preparation.
-
Cloud IAM Misconfigurations and Attack Paths: AWS Focus
Understand how cloud IAM failures lead to full environment compromise. Learn common misconfigurations, privilege escalation paths, cross-account attacks, and detection strategies with practical AWS examples.
-
Content Security Policy Explained Simply: Attack and Defense
Master Content Security Policy from both attacker and defender perspectives. Learn CSP directives, bypass techniques, and how to implement effective policies that actually protect your applications.
-
CSRF Attacks and Modern Defenses: A Complete Guide
Master CSRF attacks from fundamentals to modern bypass techniques. Learn how CSRF tokens work, SameSite cookie attributes, common bypasses, and how modern frameworks protect against these attacks.
-
DOM-Based XSS Deep Dive: Client-Side Vulnerabilities Explained
Master DOM-based XSS vulnerabilities from identification to exploitation. Learn sources, sinks, payload crafting, and detection techniques with browser DevTools and practical examples.
-
Business Logic Vulnerabilities: What Scanners Miss
Master business logic vulnerabilities that automated scanners can't find. Learn real-world attack examples, testing methodology, and how to explain these non-technical flaws in security interviews.
-
Cloud Fundamentals for Security Engineers: AWS First Approach
Build essential cloud security knowledge for modern security roles. Master the shared responsibility model, core AWS services, IAM fundamentals, and common cloud security mistakes with practical examples and interview preparation.
-
Git and Version Control for Security Engineers: A Practical Guide
Master Git fundamentals for security engineering. Learn secure code review, secrets management, real-world breach analysis, and how to use GitHub as your professional security portfolio.
-
Bash and PowerShell for Security Automation: A Practical Guide
Master security automation with Bash and PowerShell. Learn to automate reconnaissance, log parsing, and security tasks with practical scripts for both offensive and defensive operations.
-
Linux Hardening for Security Engineers: A Practical Guide
Master Linux hardening fundamentals from a security engineer perspective. Learn threat modeling, user management, file permissions, SSH hardening, and service minimization with hands-on labs and interview preparation.
-
Serialization Attacks for Pentesters: Deserialization Vulnerabilities Explained
Master serialization and deserialization attacks. Learn how to identify and exploit insecure deserialization in Java, PHP, Python, .NET, and more.
-
How Proxies Work for Pentesters: Forward, Reverse & Interception
Master proxy fundamentals for penetration testing. Learn forward vs reverse proxies, transparent proxies, Burp Suite internals, and how to intercept HTTPS traffic.
-
Same-Origin Policy & CORS Deep Dive for Pentesters
Master browser security fundamentals. Learn Same-Origin Policy, CORS misconfigurations, and how to exploit cross-origin vulnerabilities in penetration testing.
-
ARP & Layer 2 Attacks for Pentesters: MITM, Spoofing & Network Attacks
Master Layer 2 network attacks for penetration testing. Learn ARP spoofing, MAC flooding, VLAN hopping, and MITM techniques with practical examples.
-
TCP/IP Deep Dive for Pentesters: Flags, Attacks & Analysis
Master TCP/IP internals for penetration testing. Learn TCP flags, the three-way handshake, sequence numbers, TCP attacks, and packet analysis techniques.
-
How Email Works for Pentesters: SMTP, SPF, DKIM, DMARC Explained
Master email security for penetration testing. Learn how SMTP works, understand SPF/DKIM/DMARC, and discover email spoofing techniques and defenses.
-
Authentication Flows & Vulnerabilities: A Visual Whiteboard Guide
Master authentication security with visual flow diagrams. Learn where vulnerabilities occur in session, JWT, OAuth, SAML, and MFA flows. Perfect for pentesting and security interviews.
-
Web Application Pentesting: The Complete Beginner's Guide
A hands-on guide to web application penetration testing. Master HTTP fundamentals, OWASP Top 10 vulnerabilities, and essential tools for finding security flaws.
-
PKI & Certificates for Pentesters: How Digital Trust Works
Master Public Key Infrastructure and X.509 certificates. Learn how digital trust works, certificate validation, common misconfigurations, and certificate-based attacks for penetration testing.
-
Encoding vs Encryption vs Hashing: A Pentester's Guide
Master the differences between encoding, encryption, and hashing. Learn when each is used, common mistakes developers make, and how to exploit misuse in penetration testing.
-
TLS/SSL Handshake Explained: How HTTPS Works and How to Attack It
Master TLS/SSL for penetration testing. Learn how the TLS handshake works, cipher suites, certificate validation, and common attacks like BEAST, POODLE, and Heartbleed.
-
DNS Deep Dive for Pentesters: How DNS Works and How to Attack It
Master DNS for penetration testing. Learn how DNS works, record types, zone transfers, DNS attacks, and enumeration techniques every pentester needs to know.
-
Network Fundamentals for Pentesters: The Complete Beginner's Guide
Master the networking fundamentals every pentester needs. From OSI model to nmap, learn how data travels and how to find vulnerabilities in network infrastructure.
-
Web Basics for Pentesters: HTML, JavaScript, Cookies & Headers
Understand how the web works before hacking it. Learn HTML, JavaScript, HTTP headers, cookies, and browser security - essential knowledge for web application pentesting.
-
Welcome to SecureKhan
Introducing SecureKhan - a cybersecurity blog covering penetration testing, cloud security, compliance, and more.
-
Linux Fundamentals for Pentesters: Command Line Essentials
Master Linux command line essentials for penetration testing. Learn file system navigation, permissions, networking commands, and bash scripting basics.