June 2023

Phases of Penetration Testing

What is Penetration Testing? Penetration testing is another term for ethical hacking. It is a process of finding security vulnerabilities in computer networks, systems or servers, web-applications, etc. The penetration testers use these vulnerabilities to exploit the target. The main objective of ethical hacking is to find security weaknesses to patch them. The main purpose …

Phases of Penetration Testing Read More »

WPA/WPA2 Cracking Attacks (Explained)

What is WPA/WPA2? WPA stands for Wi-Fi Protected Access. WPA is a security standard for wireless networks. It provides a sophisticated data encryption and better user authentication. These protocols are developed by Wi-Fi alliance. In order to cover the serious weaknesses provided by WEP(Wired Equivalent Privacy) encryption, WPA was developed. WPA provides much more security …

WPA/WPA2 Cracking Attacks (Explained) Read More »

Password Attacks Explained. How to defend against password attacks?

What is a Password Attack? Password attack is an attack in which a non-authorized, third party tries to gain access to your accounts or systems by cracking a user’s password. This kind of attack does not require any malicious code or software to run on the system. But the attacker can use the software which …

Password Attacks Explained. How to defend against password attacks? Read More »

Anonymity (Explained). How to browse Anonymously?

What is Anonymous Browsing? Anonymous browsing refers to browsing the web content in such a way that it hides the user’s personal information. An attacker uses this in order to protect his identity during an unauthorized attack. Many of the normal people also wish to browse anonymously due to privacy. For security reasons, they don’t …

Anonymity (Explained). How to browse Anonymously? Read More »

Google Dorking

What is Google Dorking? Google Dorking or hacking involves the use of operators in the Google search engine to locate specific words or text strings within search results. It is basically an information-gathering technique. The attacker can use this technique to gain specific open-source sensitive information of the target. The hackers can also use google …

Google Dorking Read More »