Cyber Kill Chain Methodology
The figure shows the cyber kill chain. It sounds mysterious but actually it’s not that mysterious. We have reconnaissance, weaponization, delivery, exploitation, installation, command, and…
The figure shows the cyber kill chain. It sounds mysterious but actually it’s not that mysterious. We have reconnaissance, weaponization, delivery, exploitation, installation, command, and…
What is information security? While we have information, information is actually different than data. Information has meaning, and as such…
Network Mapper, otherwise known as “Nmap,” is a powerful open-source program, perfect for conducting reconnaissance and enumeration. Yes, Nmap is…
Which Ports Are Usually Open By Default? There are a LOT of ports. A port number can be anything from…
A social engineering attack leverages the weakest link in an organization, which is the human user. If an attacker can…
Your home networks might have a range of wireless devices on them — from computers and phones to IP cameras, voice assistants,…
Ethical hacking is an authorized practice of detecting vulnerabilities in an application, system, or organization’s infrastructure and bypassing system security…