GHIDRA

Introduction

Ghidra is an open source and free reverse engineering application developed by National Security Agency(NSA) which is available on all the platforms i.e Mac,Linux,Windows. The binaries were released at RSA Conference in the year 2019 in March; the sources were published after a month on GitHub. Ghidra is seen by many pentesters as a competitor to IDA Pro. The source code is completely available for download at ghidra-sre.org along with the latest 9.1.1 patch.

Read More

Enumeration is the Key!

Introduction

One of the most important steps in web application testing or bug bounty hunting is enumeration. Enumeration is the first attack on target network. It is the process of actively or passively collecting information about the target. The more information we collect about the target, the easier it becomes to exploit the target in further steps. Although web enumeration holds so much importance in testing, it is one of the most neglected steps by many pen-testers. In this article we will cover the basic methodology for web enumeration.

Read More

Metasploit

Introduction

Metasploit Framework is an Open Source framework used for exploitation and post exploitation of networks usually during a Network Penetration Testing.

Read More

Lattice Based Cryptography

Cryptography

Before we dive into all fun juicy topic of lattice based cryptography we must know about cryptography. Cryptography is study and practice of technique used to maintain confidentiality of data.In layman's term cryptography is about constructing and analysing the protocol which prevents a third person from reading a private message or data maintaining the confidentiality. Cryptography exist on the principles of mathematics and computer science.

Read More

Network VAPT

Introduction

A computer network is a digital telecommunications network which allows nodes to share resources. Computers on a network are called nodes or we can say A network is defined as a group of two or more computer systems linked together.To communicate with other computer or node through network it uses different protocol.

Read More

Bettercap

Introduction

Bettercap is a sniffer which is powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.

Read More

Linux and Misconceptions

Introduction

Linux has millions of users of it. But on the other hand do you know what else it has? THE MISCONCEPTIONS. Which continue to give people false idea of what actually Linux is like. Let's dig into few of the (un)common misconceptions:

Read More

USB Forensic and Data Recovery

Introduction

Any storage device such as a Pen drive, Memory card or Hard disk is used it to store/transfer officials/ Personal Information. Official Information such as Designs, blueprints, prototypes which belongs to any organizations .where personal information such as photos, videos, movies call records etc.

Read More

OS Hardening

Introduction

You must have an operating system, right? And you must be using it on a daily basis either for your professional and personal work, right? if yes, then you must be worried about the security of your operating system for many reasons. Don't worry my friend, I'll let you know about the perfect solution in this blog which is OS hardening, just stay tuned.

Read More

Threat Intelligence

Introduction

In recent years, cyberthreat intelligence has become an important supporting pillar in a mature cybersecurity strategy. When applied well, threat intelligence can help security teams defend against an ever-more sophisticated threat landscape before, during and after attack.

Read More

What’s and how’s of Docker

Introduction

Docker is a tool designed to make it easier to create, deploy and run applications using Docker containers. Docker containers allow a developer to package up an application with all of the parts it needs, such as libraries and other dependencies and ship it all out as one package.

Read More

Web UI Version For Bettercap

Introduction

Now the good thing done by the Bettercap community is that, they recently launched a Web UI version of Bettercap which is really awesome and easy to manage for newbie’s as well as experts. But first need to install it. So, this article is for how to install and configure Web UI version of Bettercap 2.24

Read More