User Enumeration in Ethical Hacking
User enumeration is an important stage in penetration testing where the hacker will use a set of methods to find out valid user names on a company’s network. They will then attempt to use each of these usernames and passwords until they are able to gain unauthorized access to the system....
read more
Man-in-the-Browser Attack
Cyber security in today’s world is one of the biggest necessities of all time. It is important to safeguard the data that is present on the web. With the increasing demand for the internet and the services related to the internet, cyber crimes have become all the more common....
read more
How to Defend Against Wi-Fi Pineapple?
A Hack Wi-Fi Pineapple is a wireless auditing platform that enables network security managers to do penetration testing. Penetration tests are a sort of ethical hacking in which white hat hackers look for security flaws that a black hat attacker may exploit. A Wi-Fi Pineapple resembles a typical Wi-Fi router in appearance. The main difference between these two is that Wi-Fi Pineapples frequently have a slew of additional aerials protruding from the top. Recently, there has been an upsurge in the use of the Wi-Fi Pineapple in “Red Team Suit Auditing,” which is an evaluation performed by the organization to illustrate how hackers employ various flaws to achieve their goals. A Wi-Fi Pineapple is more popular on public Wi-Fi networks, which are dangerous and expose your personal information....
read more
Malicious Script
Malicious scripts are used by cybercriminals in order to harm the recipients by injecting harmful code designed by them into a legitimate website or simply modifying the code without anyone permission. Cyber threat actors hide client-side online apps and webpages on respectable websites, third-party scripts, and other places to undermine their security....
read more
Cyber Security Interview Questions
Cybersecurity is the act of protecting systems, networks, and programs from digital attacks that can compromise the confidentiality, integrity, and availability of data. These cyber-attacks can take various forms, such as malware, phishing, ransomware, denial-of-service, or advanced persistent threats. They typically aim to access, alter or destroy sensitive information, extort money from users, or disrupt normal business processes....
read more
How to Prevent Privilege Escalation?
Privilege escalation is the process of exploiting a bug or design flaw in an operating system and obtaining elevated privileges to access information, change data, or exploit vulnerabilities. This blog post explores some common ways privilege escalation could be mitigated....
read more
Anti Forensics
Anti-forensics is a term that contradicts Cyber Forensics. It attempts to negatively affect the existing amount and quality of evidence from a crime scene or make the analysis and examination of evidence difficult or impossible to conduct....
read more
Difference Between Vishing and Smishing Attacks
Pre-requisites: Difference between Phishing and Vishing...
read more
Capture File Properties Dialog in Wireshark
In Wireshark, after capturing some traffic of a network we can save the capture file on our local device so that it can be analyzed thoroughly in the future. We can save captured packets by using the File → Save or File → Save As…​ menu items. Sometimes we need the details and properties of the captured file. The general information about any saved capture file will be displayed in the “Capture File Properties” dialogue....
read more
Warchalking in Wireless Networks
War chalking is the drawing of symbols in open spaces to warn about Wi-Fi wireless networks. War chalking occurs when people draw symbols in areas to indicate the presence of an open Wi-Fi network. The symbols used typically say something about the access point. War chalking attracted hackers to break into the said public Wi-Fi networks and gather information about their users....
read more
What is SQL Slammer Virus?
The SQL Slammer is a computer virus that began in January 2003 and caused a denial of service on some Internet hosts, significantly slowing general Internet traffic. It spread rapidly and within 10 minutes he infected most of his 75,000 victims. Although the program is called the “SQL Slammer Worm”, it does not use the SQL language. His two buffer overflows exploited his bug in SQL Server, Microsoft’s flagship database product. The worm was based on proof-of-concept code demonstrated at a Black Hat briefing by David Litchfield, who first discovered the buffer overflow vulnerability that the worm exploits. This is a small code that just generates random IP addresses and sends itself to those addresses. The main symptom of a SQL Slammer infection is increased outbound traffic to UDP 1434. Worms fit in a single packet, so a worm can spread quickly when a computer launches an infected packet....
read more
UDP Session Hijacking
UDS Packet is a low-level transport protocol used on LAN‘s and WAN‘s to send packets between two endpoints. UDP Session Hijacking is an attack where the attacker tricks the victim into using their computer as part of a botnet, typically by sending them unsolicited requests disguised as coming from legitimate sources. This illegitimate traffic can then be used to exploit vulnerable systems or steal data. UDP session hijacking is a method of compromising a computer session by manipulating the session’s Transmission Control Protocol (TCP) traffic. The attacker manipulates the data sent over the network, which can then be used to hijack the session or steal information....
read more