Skip to content
  • Wednesday 22nd March 2023
    • Medium

    Patch The Net

    One node at a time

    • Linux
    • Web Application Security
    • Red Teaming
    • CISSP Prep

    Tag: ISACA

    • CISSP Articles
    • CISSP Prep

    COBIT – IT Governance Framework

    For years, organizations have suffered from a crucial gap that existed between business objectives and IT governance. IT activities were not always aligned with business goals, information technology risks were […]

    View the post
    A. BoukarDecember 2, 2020December 27, 2020
    Tags: COBITCOBIT5ISACAIT Governance

    Latest Articles

    • netcal-for-bind-and-reverse-shell
      April 18, 2022December 25, 2022A. Boukar

      Create Bind and Reverse Shells using Netcat

    • SSRF Explained
      April 8, 2022April 8, 2022A. Boukar

      Server-Side Request Forgery (SSRF) Explained

    • Host Header Injection Attack
      February 5, 2022December 25, 2022A. Boukar

      Host Header Injection Attacks

    • http request smuggling attack
      December 31, 2021December 25, 2022A. Boukar

      HTTP Request Smuggling Explained

    • XXE
      December 12, 2021December 25, 2022A. Boukar

      XXE Attacks Explained

    Newsletter

    Recent Posts

    • Create Bind and Reverse Shells using Netcat
    • Server-Side Request Forgery (SSRF) Explained
    • Chapter 12 – Bash Scripting
    • Host Header Injection Attacks
    • HTTP Request Smuggling Explained
    Copyright All rights reserved - Patchthenet.com
    • Medium