ONC-RPC Programs in Wireshark
The ONC-RPC protocol is a set of standards for remote procedure calls and allows computer programs to communicate over the network. This article will help you to understand ONC-RPC (ONC Remote Procedure Call) programs that transmit information through Wireshark....
read more
List of Auxiliary Module Reference in Metasploit
The Metasploit Project is a computer security project that provides data about security vulnerabilities and assists in penetration testing. It is owned by Rapid7, a US-based cybersecurity firm. A notable subproject of Metasploit is the open-source Metasploit Framework—a tool used to develop and run exploit code on remote target systems....
read more
Types of Rootkits
A rootkit is a collection of software that is used by the hacker and specially designed for doing malicious attacks like malware attacks to gain control by infecting its target user or network. There are different types of Methods by which hackers install rootkits on the target user’s computer....
read more
What is Stunnel Tool?
Stunnel is a very versatile open-source tool designed to help secure web applications. It encrypts traffic, proxies connections, and redirects web applications so that they can run securely on a computer with untrusted network connections. Stunnel can also inspect every packet within encrypted tunnels and make adjustments to improve performance. Stunnel manages one or more client-server TCP/IP connections by creating an encrypted tunnel through which only the client and server are allowed to speak. This encrypted connection is in lieu of a direct connection between the client’s application and the server’s application, which helps prevent tampering with communications in transit from one end of the connection to another....
read more
Difference Between Spoofing and Hijacking
In spoofing hackers’ main goal is to win the trust of the target (Victim) by convincing him that they are interacting with a trusted source. After winning trust, hackers can easily enter the target system, spread the malicious code of the malware, and steal useful information such as passwords, PINs, etc., that the target stores in the system. In spoofing, the hacker’s main objective is to psychologically manipulate the target and win their trust.  For example, hackers create a clone of a banking website that completely appears to be legal but when the target enters sensitive information then the whole information is sent to the hacker, which the hacker can use for their own benefit or for other purposes....
read more
Steps of Finding Packets in Wireshark
In Wireshark, after capturing some traffic of a network we can save the capture file on our local device so that it can be analyzed thoroughly in the future. We can save captured packets by using the File → Save or File → Save As…​ menu items. While analyzing sometimes we need to search for a specific packet. We can find that specific packet using the “Find Packet” toolbar....
read more
Name Resolution in Wireshark
The Wireshark is the Network analyzer tool where you can check the traffic, and you can get to know what the packets are transferring from your WAN to LAN. This is a great tool to dissect the traffic, and you can analyze it further. HTTP traffic is not encrypted, so you can see the actual username and password. But in case of the encrypted traffic i.e, SSL/TLS traffic, every packet you see is Gibberish, you cannot read the content and that is because of SSL/TLS handshake where the certificate is exchanged and the client and server exchange their Encrypted cipher suites, and they agree upon to use the algorithm and for the session, the same algorithm would be used further....
read more
What is SMTP Header Injection?
SMTP is a Simple Mail Transfer Protocol which handles the sending, receiving, and relaying of email on the server. It contains three main parts that are used in the SMTP header injection later on we will discuss this :...
read more
What is Credentialed Vulnerability Scan?
Cyber Security prevention is the need of today’s generation. Awareness and knowledge of proper security techniques must be spread among the cyber-using generation to prevent frequent cyber attacks from taking place in the cyber world. Here, in this article, we will discuss one very important scanning technique – Credentialed Vulnerability Scan that has played a vital role in preventing cyber attacks....
read more
What are Active Sniffing Attacks?
Active Sniffing Attacks in Ethical Hacking can lead to using the intercepted data for malicious purposes. The most common use of sniffing is to steal passwords, credit card numbers, and other sensitive data. Sniffers are software programs that let you intercept network traffic in a convert way without the knowledge of the user or administrator. Web application sniffers such as Wireshark can be used to detect this type of attack in its infancy, so organizations can prevent losses from what could be a large impact on their bottom line....
read more
How to Prevent MAC Flooding?
A flood of MAC addresses is a serious concern for ethical hackers because it can leave your system vulnerable to attack. In order to prevent this from happening, consider some of the following precautions:...
read more
What is SYN Scanning?
Internet and its usage have evolved over the years. The Internet has become an integral part of daily human activities, and it becomes hard to imagine life without the Internet. The Cyber world has become so fascinating that it is often the soft target of cyberattackers and hackers to steal personal confidential information via the internet as a medium. Unauthorized people/ hackers take the help of cyberattacks as a medium to get access to users’ or organizations’ private confidential data. This has resulted in cyber crimes has grown over the past few years....
read more