Cyber Security

The Five Phases of Penetration Testing

According to the EC-Council's Certified Ethical Hacker material, successful black hat operations typically follow five phases: Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering Tracks. In this post, we'll explore a high-level view of each phase. Reconnaissance is the act…

Hacker Classifications:The Hats

White Hats - A white hat hacker breaks security for non-malicious reasons, either to test their own security system, perform penetration tests or vulnerability assessments for a client - or while working for a security company which makes security software.…

The Network Security Zones

Internet -The internet has no centralized governance in either technological implementation or policies for access and usage.This zone is the most vulnerable to security breaches as there are no blocks to stop intrusions. Internet DMZ - The name DMZ (demilitarized…

Footprinting

Footprinting (part of reconnaissance process) is the technique used for gathering information about a target system or network.For a hacker this kind of information is very useful to access or crack systems.The hackers might use various tools and techniques. Footprinting…

PEN Testing

PEN Testing A penetration test known as a pen test, is an authorized simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system's features and data.Pen test is a way of finding loopholes…

TOOLS used in Ethical Hacking

TOOLS used in Ethical Hacking - Tools are used to prevent unauthorized hacking of computer or network system Some of the tools NMAP Metasploit Burp Suite Angry IP Scanner Cain and Abel Ettercap Ether peek Superscan QualysGuard WebInspect LC4 LANguard…

Major CPU architectures for computer processors

ARM, originally Acorn RISC Machine, later Advanced RISC Machine, is a family of reduced instruction set computing (RISC) architectures for computer processors, configured for various environments. British company ARM Holdings develops the architecture and licenses it to other companies, who…

Hosted virtualization hypervisors

Major Hosted virtualization hypervisors - VMware Workstation/Fusion/Player. VMware Player is a free virtualization hypervisor. VMware Server. Microsoft Virtual PC. Oracle VM VirtualBox. Red Hat Enterprise Virtualization. Parallels Desktop. Platform virtualization software, specifically emulators and hypervisors, are software packages that emulate…

How to change MAC address using macchanger on Kali Linux

We can change our MAC address value that is stored in the memory using a program called macchanger like so: > ifconfig [INTERFACE] down > macchanger -m [MAC] [INTERFACE] > ifconfig [INTERFACE] up Related Articles, https://linuxconfig.org/how-to-change-mac-address-using-macchanger-on-kali-linux

Ranting about Cyber-security

Cyber-security is to protect information systems in any means and it’s a broader topic to discuss which will cover multiple terms, methods, topics, technologies. Computer security or IT security or cyber security is very important nowadays due to increased dependency…