Windows Process ID ways Techhyme

[Windows 10] Ways To Find the Process ID of any Application

In computing, the process identifier (a.k.a. process ID or PID) is a number used by most operating system kernels—such as those of Unix, macOS and Windows — to uniquely identify an active process….

Read more
PHP MySQL Ajax Demo Techhyme

Fetch Information From Database using PHP/AJAX/MySQL

In this tutorial, we will see how to make Ajax work with PHP and MySQL. We will create a small web application which will fetch the information from Database using PHP and Ajax….

Read more
Dirty Pipe Exploitation Techhyme

[Kali Linux] Exploitation of Dirty Pipe Vulnerability CVE-2022-0847

On March 7, 2022, Max Kellerman from CM4All disclosed a local privilege escalation vulnerability (CVE-2022-0847) found in Linux kernel version 5.8 and newer. This vulnerability allows attackers to overwrite read-only or immutable files…

Read more
wireless hacking sniffing create fake access point wpa2 dnsmasq hostapd techhyme

Wireless Sniffing with Fake Access Point (WPA2) – A Practical Demonstration

In this article we’ll be setting up a Fake Access Point. As you know, Access Points or routers transmit their WiFi network(s) with a SSID. Some of these names can be very common….

Read more
Vmware ESXI log forwarding techhyme

How To Forward VMWare ESXI Logs to ELK Stack

In this article, we will learn to configure VMWare ESXI logs to ELK stack using UDP and Syslog protocol. As we all knows, Logstash is configured through a number of plugins that support…

Read more
Top Networking Commands Techhyme

Top 10 Windows and UNIX/Linux Networking Commands

IT security professionals use a lot of tools to keep networks secure. These tools range from go-to utilities that run from the command-line interface of just about every operating system to more complex…

Read more
Fix Windows 7 Update Error Techhyme

[Windows 7] Fix Windows Update Error Code 80072EFE

Your computer is more vulnerable when its OS is out of date. While system updates don’t protect you in the same way an antivirus does, updates help keep your computer safe from the…

Read more
Wireless Cracking WPA2-PSK Dictionary attack 2022 Techhyme

[Kali Linux] Crack Wireless Password (WPA2-PSK) in 8 Easy Steps

Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to many wireless attacks. There is no debate about how much easier WiFi has made our lives. Now…

Read more
sql injection exploit sqlmap tutorial techhyme

[SQLMAP] How To Exploit SQL Injection Vulnerability in 4 Easy Steps

Databases are usually the main targets of any attack, specifically for the information that they store in their database. According to OWASP Standard, the SQL injection vulnerability is one of the ten most…

Read more
readelf command examples techhyme

Top Commands of ReadELF for Analyzing Binary Files

When you compile any source code, an object file is generated of that program and with the help of linker, that object files gets converted to a binary file which, only the machine…

Read more

[Solution] Fix Windows Defender in Windows 11 Operating System

Microsoft Defender Antivirus (a.k.a Windows Defender) is a built-in free anti-malware software included with Windows 10/11 that protects the computer from viruses, malware, spywares and Trojans. In addition to antivirus and anti-malware protection,…

Read more
block USB port windows 11 techhyme

How To Disable USB Ports in Windows 11 with Registry Editor

Windows 11 is the latest major release of Microsoft’s Windows NT operating system, and is the successor to Windows 10. Citing security considerations, the system requirements for Windows 11 were increased over Windows…

Read more
root password kali linux techhyme

[Tutorial] Reset Kali Linux Root Password Without Login

Kali Linux operating system can be considered the number one security operating system of today. This is the operating system that the programming world usually likes to use to perform penetration testing or…

Read more
PHP settings configuration options techhyme

3 Ways to Change PHP Configuration Settings and Options

PHP has many configuration settings that determine how it behaves. The configuration settings are stored in a text file named as php.ini. PHP looks for the file php.ini when it begins and uses…

Read more