43.6 F
Los Angeles
Thursday, February 21, 2019

Full open scan, half open scan, Xmas scan, Fin scan, Null scan.. phew.

CEH exam may ask the differences between nmap scans like; Full-open scan, Half-open scan, Xmas scan, FIN scan and Null scan. There are many good postings out there written by...

Regional Internet Registry(RIR).

Certified Ethical Hacker exam may ask about what are the names of Regional Internet Registry(RIR). There are 5 RIRs as listed below Registry Geographic Region AFRNIC Africa, portions of the Indian Ocean APNIC Portions of Asia, portions...

How does traceroute work?

CEH exam might ask you about traceroute like, How does Traceroute map the route that a packet travels from point A to point B?   Right explaination would be; By manipulating the value of...

AND, OR, XOR operations

CEH v9 test would like to see if you understand the concept of Exclusive OR(XOR) operation, or more likely how to calculate binary numbers using 'XOR' operation. Basically these type...

Reconnaissance’s best friend; Google dorks.

The Google dorks can be a very useful tool for both of passive and active reconnaissance. By combining Google provided search operators like; inurl, intitle, intext, filetype, etc.. you can bring up...

MAC Filtering – Part 2 : Whitelist

Case 2 (Hey wait.. what was "Case 1" ??) What if Bob is not just an annoying customer of a local cafe but he is actually a malicious user within your enterprise network?...

MAC Filtering – Part 1 : Blacklist

Case 1 Let's say you are the owner of a small local cafe and there is this annoying customer named Bob who comes every day, order a dollar coffee and stays forever. Not...

Fun with Android phone(Reverse_TCP, Camera control, Dump contacts remotely)

We all have been told a rooted android phone is vulnerable. That brings me an additional question; "If an android phone is not-rooted, out-of-box condition, is it safe then?" In...

“Steghide”, a Steganography tool

  Steganography Having sophisticate abnormal activity detection devices would mitigate infiltration attempts from outside of the organization. But how about if the threat is inside of your organization already and has some access...

WEP password cracking

1. Introduction Wired Equivalent Privacy (WEP) is arguably the weakest encryption protocols. Unlike how its name sounds, the WEP standard was found to be flawed and highly vulnerable. Sadly it is...

Stay connected

14,392FansLike
1,316FollowersFollow
9,613SubscribersSubscribe
- Advertisement -

Latest article

Apparmor: A Linux Security Module(LSM)

Last year I was at my client's office for assessment. The IT manager introduced me to the team and that's when I saw the...

Hash? When do we need it?

Characteristics In the previous posting, we talked about why do we need hash and today we will talk about when do we need the hash. Hash is...

Kali Linux returns a GPG error

I was trying to create a Kali Linux VM the other day and the internet was really slow out of sudden. It was one of...