Secjuice
  • Technical
  • OSINT
  • Unusual Journeys
  • HoF
  • Write With Us
  • Hire A Writer
  • About Us
  • Rankings
Hozaifa Owaisi

Hozaifa Owaisi

I am a self taught nobody

Raleigh NC •
9 posts •
INFOSEC

Squeeze Volume 12 - sudo, Cisco, WhatsApp, and Android Bluetooth bugs & more!

Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.

  • Secjuice
    Secjuice
  • Manmeet Singh Bhatia
    Manmeet Singh Bhatia
  • Guise Bule
    Guise Bule
  • Chad Calease
    Chad Calease
  • Bhumish Gajjar
    Bhumish Gajjar
  • Hozaifa Owaisi
    Hozaifa Owaisi
  • Olivia Stella
    Olivia Stella
4 min read
TECHNICAL

Vehicle Hacking Part 1: Understanding the Attack Surface

Car Hacking 101 - Understanding the attack surface and mapping out basic threat modelling for cars IO points.

  • Hozaifa Owaisi
    Hozaifa Owaisi
5 min read
INFOSEC

Squeeze Volume 9 - NSA Discloses Windows Flaw, Cellebrite Buys BlackBag, P&B Bank Hacked, & More

Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.

  • Secjuice
    Secjuice
  • Miguel A. Calles MBA
    Miguel A. Calles MBA
  • Bhumish Gajjar
    Bhumish Gajjar
  • Mike Peterson
    Mike Peterson
  • Hozaifa Owaisi
    Hozaifa Owaisi
6 min read
TECHNICAL

Quantum Computing 101 - Part Two (Shor's Algorithm)

Welcome to part two of our series on Quantum Computing, in which security research Kaboom hurts our heads with math by explaining Shors Algorithm.

  • Hozaifa Owaisi
    Hozaifa Owaisi
4 min read
INFOSEC

Squeeze Volume 8 - Las Vegas Defeats Cyber Attack, Xiaomi Nest/TikTok/Citrix Vulnerabilities, & More

Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.

  • Secjuice
    Secjuice
  • Manmeet Singh Bhatia
    Manmeet Singh Bhatia
  • Miguel A. Calles MBA
    Miguel A. Calles MBA
  • Bhumish Gajjar
    Bhumish Gajjar
  • Hozaifa Owaisi
    Hozaifa Owaisi
  • Secprentice
    Secprentice
7 min read
TECHNICAL

Penetration Testing Scanning 101.3

In part three of his series on penetration testing security researcher Hozaifa Owaisi covers port scanning and the tools used to get the job done.

  • Hozaifa Owaisi
    Hozaifa Owaisi
6 min read
CYBERSEC

Quantum Computing 101 - Part One

Quantum Physics studies the behavior of matter & energy at the molecular, atomic & nuclear levels and it will have a huge impact on secure computing.

  • Hozaifa Owaisi
    Hozaifa Owaisi
5 min read
CYBERSEC

Penetration Testing Scanning 101.2

Part two of the hugely popular Penetration Testing 101 series from security researcher Hozaifa Owaisi, who breaks down network tracing and the tools he uses to scan networks.

  • Hozaifa Owaisi
    Hozaifa Owaisi
5 min read
CYBERSEC

Penetration Test Scanning 101

Lets take a look at the different types of attack involved in penetration test scanning and get a high level overview of how they work, with security researcher Hozaifa Owaisi.

  • Hozaifa Owaisi
    Hozaifa Owaisi
4 min read
Secjuice © 2022
Linkedin Facebook Twitter Remote Browser Isolation