MY OSCP JOURNEY | How I Passed the Exam with 100 points!
MY OSCP JOURNEY | How I Passed the Exam with 100 points! Passed OSCP last month, very tough journey but very rewarding as well! I wanted to share some tips and advice because I’m seeing a lot of people failing over the last two months and I’d be one ofContinue Reading
How Does Wireless Security Work
Wireless security is a set of measures and protocols designed to protect wireless networks and their data from unauthorized access, data interception, and other security threats. It is essential to secure wireless networks as they transmit data over the airwaves, making them susceptible to eavesdropping and attacks by malicious actors.Continue Reading
Introduction to Penetration Testing
Introduction to Penetration Testing Penetration testing, often referred to as “pen testing” or “ethical hacking,” is a controlled and authorized cybersecurity assessment conducted to evaluate the security of an organization’s IT infrastructure, applications, and network. The primary objective of penetration testing is to identify vulnerabilities and weaknesses that could beContinue Reading
Introduction to System Hardening Basic Security Configuration
Introduction to System Hardening Basic Security Configuration System hardening is a crucial practice in the field of cybersecurity and information technology. It involves implementing various security measures to strengthen the security of computer systems, servers, and network devices, making them more resistant to potential cyber threats and attacks. The mainContinue Reading
Introduction Of Honey Pots
Introduction Of Honey Pots Honey pots are a fascinating and valuable tool used in the field of ethical hacking and cybersecurity. A honey pot is a decoy system or network designed to attract and deceive potential attackers, thereby diverting their attention from critical systems and data. The term “honey pot”Continue Reading
Introduction to wireshark
Introduction to wireshark Introduction to wireshark :- Wireshark is a widely used open-source network protocol analyzer that allows users to inspect and analyse network traffic in real-time. Originally known as Ethereal, it was renamed Wireshark in 2006. It is available for multiple platforms, including Windows, macOS, and various Linux distributions,Continue Reading
Joomla Content Management System Cyber Security Notes
Joomla Content Management System Cyber Security Notes What Is a CMS? ================ joomla :- A Content Mnagement System(CMS), is a system that allows you to manage information easily and effectively. The information could be anything, whether it’s a simple article or a complex media management system. It’s for non-technical usersContinue Reading
CMS WordPress vulnerbility Cyber Security Notes
CMS WordPress vulnerbility Cyber Security Notes ————————- WORDPESS :- For creating a whole new website, you just need to drag and drop the site’s element only. You do not need to have very awesome knowledge of HTML, JS, PHP and all…. So you are just required to have a goodContinue Reading
INTRODUCTION TO NESSUS for Cyber Security in 2023
INTRODUCTION TO NESSUS ====================== Nessus is one of the most popular and capable vulnerability scanners, it is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture regarding all the CVE’s , CWE’s , CVSS Scores and other architectures regarding all the Network Attacks. Nessus is aContinue Reading
BEEF AND SOCIAL ENGINEERING TOOLKIT
BEEF AND SOCIAL ENGINEERING TOOLKIT SOCIAL ENGINEERING TOOLKIT (SET) ================================= The Social Engineering Toolkit (SET) is an automated python based toolkit, specifically designed to perform advanced attacks against the human elements and is pre-installed in Kali Linux. It is very easy to use and deploy some Social EngineeringContinue Reading