Cyber Kill Chain methodology
The “Cyber Kill Chain” methodology is a framework developed by Lockheed Martin to describe the stages of a cyberattack, from initial reconnaissance to data exfiltration.
Secure Your Network: A Guide to Safe Protocols for Invulnerable Communication
In the vast realm of digital communication, ensuring that exchanged information across the network is secure is crucial. Many network protocols transmit data in plaintext,
Cryptography in Cybersecurity: A Closer Look at HashCalc, VeraCrypt, Hash Cracking, and BCTextEncoder
Cryptography is an essential component of cybersecurity, providing a secure way to protect sensitive information from unauthorised access. It involves the use of mathematical algorithms
Mastering Cyber Kill Chain: Defending Against Cyber Threats
The cyber kill chain is a concept used in cybersecurity to describe the stages of a cyberattack, from the initial reconnaissance to the final objective.
Digital Guardian: “John” the Ethical Shield
“John the Ripper” is a well-known password cracking tool used in the field of cybersecurity. It’s not only used by security professionals but also by
Man In The Middle (MITM)
In the man in the middle attack the attacker will put himself in the middle of the communication between the victim and the other device,
SQL Injection
All websites that make interaction with a DB, use SQL. But if the SQL script is not correctly written could be passible of some manipulation
CEH
Scanning and Enumeration given the following IP 192.168.1.113, what are the IP running under this subnet? netdiscover -r 192.168.1.0/24 or nmap 192.168.1.0/24 NMAP (https://www.geeksforgeeks.org/nmap-cheat-sheet/?ref=ml_lbp) To
Steganography
Steganography is the practice of hiding a message inside of (or even on top of) something that is not secret. The steganography has the double
Functional Attack to API providers
We could have few security attacks to an API: SQL Injections In this attack, the attacker tries to identify input parameters used in a SQL
Getting access to Android using ADB
ADB stands for Android Debug Bridge and it is a CLI used to communicate with an Android device which is physically connected (through a USB
Metasploit
Metasploit Framework is a cybersecurity project that provides info about vulnerability, simplifies penetration tests and helps in the development of intrusions systems check. It is
WP Scan
WPScan is a tool designed to test the security of a WordPress web site. To use it, simply type: Adding -e u parameter it will
NMAP, discover devices on the (same) network
There are different tools that can discover devices connected on the same network. The simpler one is netdiscover. Let’s check our subnet before. Type, so
MAC Address
MAC stands for Media Access Control. It is a Permanent, Physical, Unique (in the world) “code” assigned to a physical object that allows to connect
Website hack – discovering vulnerabilities
File upload The easy type of vulnerability, because a php o python or other type of file could be uploaded and, once called can represent
Preliminary steps to get information about target website
Do you want to hack a wesite? Follow these steps first, to gather few information about it. Try to get the following: IP address So
How to get wireless with WPS enabled
we will use a program named wash root@kali:~# wash -i wlan0 where wlan0 is the wireless network interface root@kali:~# aireplay-ng –fakeauth 30 -a E4:8F:34:37:BA:0C -h
Airodump-ng
With a wireless adapter in monitor mode you are able to sniff packet in the air: at least the one in our range even if
How to set wireless adapter in monitor mode
Get the wireless id iwconfig put it down ifconfig wlan0 down to kill any process that could interfere with using our interface (not mandatory) airmon-ng