Cyber Kill Chain: Reconnaissance
No wonder that cyber threats pose a significant risk to all of us be it individuals, organizations and nations. Cyber-attacks …
Unveiling Cyber Threats: Understanding Reconnaissance in the Cyber Kill Chain and the importance of Threat Intelligence
Introduction Many enterprises have significantly improved their cybersecurity posture the past decades, effectively preventing known attacks through the integration of …
Methods for Analyzing the Human Resource Aspect of Cybersecurity and Espionage
Introduction In the cybersecurity landscape, the concept of "watchers" encompasses a range of roles and intentions, each with its own …
Unveiling Digital Shadows: Understanding Modern Reconnaissance Techniques
In today's digital age, our online activities leave behind a trail of data that various entities meticulously collect and analyze. …
Weaponizing Raspberry Pi with The PenTesters Framework
Raspberry Pi Single Board Computers are used very frequently in security. The small and inexpensive units work very well for …
Writing A Simple Ransomware Using Python
Introduction: Ransomware is a program designed to prevent a user or organization from accessing files on their computers. It encrypts …
Exclusive Interview with Alexandre Teyar - the creator of BurpGPT
Dear Readers, Burp Suite and ChatGPT have been hot topics in the world of Cybersecurity. That is why we have …
Hashcat: A Beginner's Guide
Disclaimer: This is intended to be used solely for ethical purposes. Please make sure you don't try the below-discussed methods …
Exploiting SQL injection using acunetix vulnerability scanner and sqlmap
SQL injection (SQLi) SQLi is the most well-known of all web application flaws and most web application security professionals have …
The Dark Web
What exactly is the Dark Web? This is a secret part of the internet that’s hidden from the current surface …
Top Hacking Tools & Techniques for 2024
Introduction The territory of ethical hacking and penetration testing has undergone a significant transformation and automated pen testing tools have …
Cyber Counter-Terrorism: Shutdown
Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as …
Engaging Social Engineering: Extracting Information through Strategic Interactions
Editorial note: We decided to remove any and all last names from the examples section as to not be drawn …
When PT in ChatGPT refers to Penetration Testing
Reconnaissance and scanning A word of caution: this article makes considerable use of concepts such as Sarcasm and Irony. If …
Cyber Threat with Chat GPT
Repetitive tasks, tons of labor hours going into mundane tasks, delayed response to complex customer queries and lack of real-time …
Metasploit from Scratch
Introduction Metasploit Framework is a penetration testing technology that has new and enhanced capabilities, including automation APIs, evasion modules, and …
Protecting Yourself From People Like Me
As a pentester, part of my job is running social engineering exercises. To be successful, I look for information I …
Slicing the Onion: An introduction to the Onion Routing
When you first searched for information about terms like “Tor network”, “deep web” or “dark web” you probably ended up …
Impact of Artificial Intelligence on Cybersecurity
Impact of Artificial Intelligence on Cybersecurity Current advances in Artificial Intelligence (AI) are widely impacting the cybersecurity industry. Companies are …
Dynamic SQLIA Detection with PHP
Introduction We’re going to discuss a dynamic approach to detect an SQL Injection Attack (SQLIA) based on a static pattern …
A review of some encryption methodologies and an introduction to a new methodology that may challenge the National Security Agency.
Encrypting information is not new; it's as old as the Roman Empire and even further back than that. Today the …
Getting Offensive with Go
Introduction Creating Reverse Shells and bypassing Anti-Virus (AV) with Golang. Using Golang in security has become very popular over the …
Modern Special Forces Of The Future (Air, Land, Sea, Cyber)
The world is becoming more complicated and unpredictable, which means that the world's armed forces need to evolve in order …
DDoS ATTACK ORCHESTRATION ON THE DARK WEB: AN OVERVIEW BEHIND THE SCENES OF A CYBERTHREAT
INTRODUCTION The internet has become a huge and diversified area in the digital age, enabling communication, access to information, and …
Cyber Kill Chain: Reconnaissance
No wonder that cyber threats pose a significant risk to all of us be it individuals, organizations and nations. Cyber-attacks …
Unveiling Cyber Threats: Understanding Reconnaissance in the Cyber Kill Chain and the importance of Threat Intelligence
Introduction Many enterprises have significantly improved their cybersecurity posture the past decades, effectively preventing known attacks through the integration of …
Methods for Analyzing the Human Resource Aspect of Cybersecurity and Espionage
Introduction In the cybersecurity landscape, the concept of "watchers" encompasses a range of roles and intentions, each with its own …
Unveiling Digital Shadows: Understanding Modern Reconnaissance Techniques
In today's digital age, our online activities leave behind a trail of data that various entities meticulously collect and analyze. …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …