PinnedSumanth DoddaThe Story of SMB Relay Attack!Through the Lens of LLMNR PoisoningDec 21, 2023Dec 21, 2023
PinnedSumanth DoddainDevOps.devThe Kubernetes ArchitectureMaster Node — The captain cool of the shipJun 15, 2022Jun 15, 2022
PinnedSumanth DoddainDevOps.devWhat and Why is Kubernetes?K8’s - It's just the 8 letters in between K and SApr 1, 2022Apr 1, 2022
Sumanth DoddaUnderstanding Active Directory attacksIn this blog, we'll learn everything there is to know that requires to understand active directory attacks in order to perform them, and…Oct 29, 2022Oct 29, 2022
Sumanth DoddaDocker’s Virtual NetworkEverything needed to understand docker networks, It’s simple but fascinatingMar 29, 2022Mar 29, 2022
Sumanth DoddaWhy and How to do SQL Injection?We will discuss about SQL injection in a detailed wayJun 12, 2021Jun 12, 2021
Sumanth DoddaGoogle Dorks by iamcybermightSearches for exact string/name you pass after intext: intext:”Sumanth Dodda”May 8, 20211May 8, 20211