Wireless Security

Wireless security is a set of measures and protocols designed to protect wireless networks and their data from unauthorized access, data interception, and other security threats. It is essential to secure wireless networks as they transmit data over the airwaves, making them susceptible to eavesdropping and attacks by malicious actors.Continue Reading

Penetration Testing

Introduction to Penetration Testing Penetration testing, often referred to as “pen testing” or “ethical hacking,” is a controlled and authorized cybersecurity assessment conducted to evaluate the security of an organization’s IT infrastructure, applications, and network. The primary objective of penetration testing is to identify vulnerabilities and weaknesses that could beContinue Reading

System Hardening

Introduction to System Hardening Basic Security Configuration System hardening is a crucial practice in the field of cybersecurity and information technology. It involves implementing various security measures to strengthen the security of computer systems, servers, and network devices, making them more resistant to potential cyber threats and attacks. The mainContinue Reading

Honey Pots

Introduction Of Honey Pots Honey pots are a fascinating and valuable tool used in the field of ethical hacking and cybersecurity. A honey pot is a decoy system or network designed to attract and deceive potential attackers, thereby diverting their attention from critical systems and data. The term “honey pot”Continue Reading

introduction of wireshark

Introduction to wireshark Introduction to wireshark :-  Wireshark is a widely used open-source network protocol analyzer that allows users to inspect and analyse network traffic in real-time. Originally known as Ethereal, it was renamed Wireshark in 2006. It is available for multiple platforms, including Windows, macOS, and various Linux distributions,Continue Reading


Joomla Content Management System Cyber Security Notes What Is a CMS? ================ joomla :- A Content Mnagement System(CMS), is a system that allows you to manage information easily and effectively. The information could be anything, whether it’s a simple article or a complex media management system. It’s for non-technical usersContinue Reading


CMS WordPress vulnerbility Cyber Security Notes ————————- WORDPESS :- For creating a whole new website, you just need to drag and drop the site’s element only. You do not need to have very awesome knowledge of HTML, JS, PHP and all…. So you are just required to have a goodContinue Reading

introduction to NESSUS

INTRODUCTION TO NESSUS ====================== Nessus is one of the most popular and capable vulnerability scanners, it is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture regarding all the CVE’s , CWE’s , CVSS Scores and other architectures regarding all the Network Attacks. Nessus is aContinue Reading


BEEF AND SOCIAL ENGINEERING TOOLKIT     SOCIAL ENGINEERING TOOLKIT (SET) ================================= The Social Engineering Toolkit (SET) is an automated python based toolkit, specifically designed to perform advanced attacks against the human elements and is pre-installed in Kali Linux. It is very easy to use and deploy some Social EngineeringContinue Reading

Buffer Overflow

Introduction of Buffer Overflow Cyber Security Notes Buffer over flow is the concept in which an application is poorly coded. There is no proper exception handeling deployed at all. The attacker can change the value of EIP and can overwrite it with malicious code’s address. Requirements for Buffer Overflow ————Continue Reading