Editors Choice Ethical hacking

Phases Of Hacking

How is it that these attackers, whether they are security consultants or criminals, what do they do? Well, there are some phases of hacking…

Editors Choice Ethical hacking

Hacking & Class of Hackers

What is hacking? Hacking in the broadest sense, is the ability to take a complex system and use it in a way for…

Ethical hacking Latest Posts

Indicators of Compromise (IoCs)

An Indicator of Compromise is like a clue, I see a magnifying glass here. An artifact, a little piece of forensic data that’s…

Ethical hacking Latest Posts

Tactics, Techniques, and Procedures (TTPs)

So, you know, everyone has their own style, right? The way they dress the way they walk what they do. And if…

Editors Choice Ethical hacking

Cyber Kill Chain Methodology

The figure shows the cyber kill chain. It sounds mysterious but actually it’s not that mysterious. We have reconnaissance, weaponization, delivery, exploitation, installation, command, and…

Ethical hacking Latest Posts Network Security

UNDERSTANDING NEED FOR SECURITY

What is information security? While we have information, information is actually different than data. Information has meaning, and as such…

Latest Posts

Fake friends and followers on social media – and how to spot them

One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who…

Ethical hacking Latest Posts

PenTest Edition: Go from Beginner to Advanced with nmap

Network Mapper, otherwise known as “Nmap,” is a powerful open-source program, perfect for conducting reconnaissance and enumeration. Yes, Nmap is…

Ethical hacking Latest Posts Network Security

How to Find Open/Blocked TCP/UDP ports?

Which Ports Are Usually Open By Default? There are a LOT of ports. A port number can be anything from…

Editors Choice Latest Posts

How to tell if your smartphone is spying on you

Even with the virtual assistant turned off, most of us have suspected our mobile phone is listening to our private conversations. While…