introduction of wireshark

Introduction to wireshark Introduction to wireshark :-  Wireshark is a widely used open-source network protocol analyzer that allows users to inspect and analyse network traffic in real-time. Originally known as Ethereal, it was renamed Wireshark in 2006. It is available for multiple platforms, including Windows, macOS, and various Linux distributions,Continue Reading

joomla

Joomla Content Management System Cyber Security Notes What Is a CMS? ================ joomla :- A Content Mnagement System(CMS), is a system that allows you to manage information easily and effectively. The information could be anything, whether it’s a simple article or a complex media management system. It’s for non-technical usersContinue Reading

WORDPRESS

CMS WordPress vulnerbility Cyber Security Notes ————————- WORDPESS :- For creating a whole new website, you just need to drag and drop the site’s element only. You do not need to have very awesome knowledge of HTML, JS, PHP and all…. So you are just required to have a goodContinue Reading

introduction to NESSUS

INTRODUCTION TO NESSUS ====================== Nessus is one of the most popular and capable vulnerability scanners, it is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture regarding all the CVE’s , CWE’s , CVSS Scores and other architectures regarding all the Network Attacks. Nessus is aContinue Reading

BEEF AND SOCIAL ENGINEERING TOOLKIT

BEEF AND SOCIAL ENGINEERING TOOLKIT     SOCIAL ENGINEERING TOOLKIT (SET) ================================= The Social Engineering Toolkit (SET) is an automated python based toolkit, specifically designed to perform advanced attacks against the human elements and is pre-installed in Kali Linux. It is very easy to use and deploy some Social EngineeringContinue Reading

Buffer Overflow

Introduction of Buffer Overflow Cyber Security Notes Buffer over flow is the concept in which an application is poorly coded. There is no proper exception handeling deployed at all. The attacker can change the value of EIP and can overwrite it with malicious code’s address. Requirements for Buffer Overflow ————Continue Reading

MSF VENOM

Introduction of MSF VENOM Cyber Security Notes   MSFVENOM : Which createsd payloads and binds up the encoding function in that. Msfpayload and Msfencoder in 2015 they both get binded up in one single functionality known as MSFVENOM. We use Msfvenom outside the platform of MSFConsole, cause msfconsole will onlyContinue Reading

Metasploit Framework

Introduction of Metasploit Framework Metasploit Framework is a powerful open-source penetration testing platform that enables security professionals to identify and exploit vulnerabilities in computer systems. It provides a comprehensive suite of tools and resources for assessing and securing networks, making it a valuable asset in ethical hacking and cybersecurity assessments.Continue Reading

Reverse Engineering Ethical Hacking

Reverse Engineering Tutorial Reverse Engineering Ethical Hacking Tutorial :- “Uncover the inner workings of technology through Reverse Engineering. Explore the process of dissecting software and hardware to understand their functionalities, enhance security measures, and unleash innovation. Gain insights into reverse engineering methodologies, tools, and applications to stay ahead in aContinue Reading

Wireless Security Work

How Does Wireless Security Work Why we do need wireless security free wifi —> terrorist connect—-> email send —> inocent user got punish….. Wireless secure —————- Strong password –> numbers –> alphabet –> lowercase –> upper case –> special character @bh!J33T$!NG# –> Minimum length –> 8 characters –> Never shareContinue Reading