Austin Songer
  • Home
  • Compliance Products
  • My Small Bio
Sign in Subscribe
Austin Songer

Austin Songer

Encryption

What is the difference between Symmetric and Asymmetric encryption?

Basis of ComparisonSymmetric EncryptionAsymmetric EncryptionEncryption keySame key for encryption & decryptionDifferent keys
Read More
Austin Songer
ACK

What is a three-way handshake process?

It’s called three-way handshake because three segments are exchanged between the
Read More
Austin Songer
Risk

What is the difference between Threat, Vulnerability, and Risk?

* Threat: Someone with the potential to cause harm by damaging or destroying
Read More
Austin Songer
Metasploit

Metasploit: Finding Password in Windows Password Hash File

With the meterpreter shell session open meterpreter > hashdump The contents of
Read More
Austin Songer

Required Studying Material to become a Azure Security Engineer

Manage Identity and Access (20-25%) Configure Microsoft Azure Active Directory for workloads
Read More
Austin Songer

Web Application Vulnerability Testing Checklist

Need help combating vulnerabilities? Click here for the ultimate web application vulnerability
Read More
Austin Songer

How to Implement DNS Enumeration

DNS enumeration offers TONS of helpful info on public servers, including IP
Read More
Austin Songer

Hacking a Web Application: Authentication

Want to learn more about web application hacks and authentication? Check out
Read More
Austin Songer
Austin Songer © 2025
Powered by Ghost