Cyber Security

Phases of Penetration Testing

What is Penetration Testing? Penetration testing is another term for ethical hacking. It is a process of finding security vulnerabilities in computer networks, systems or servers, web-applications, etc. The penetration testers use these vulnerabilities to exploit the target. The main objective of ethical hacking is to find security weaknesses to patch them. The main purpose …

Phases of Penetration Testing Read More »

WPA/WPA2 Cracking Attacks (Explained)

What is WPA/WPA2? WPA stands for Wi-Fi Protected Access. WPA is a security standard for wireless networks. It provides a sophisticated data encryption and better user authentication. These protocols are developed by Wi-Fi alliance. In order to cover the serious weaknesses provided by WEP(Wired Equivalent Privacy) encryption, WPA was developed. WPA provides much more security …

WPA/WPA2 Cracking Attacks (Explained) Read More »

Password Attacks Explained. How to defend against password attacks?

What is a Password Attack? Password attack is an attack in which a non-authorized, third party tries to gain access to your accounts or systems by cracking a user’s password. This kind of attack does not require any malicious code or software to run on the system. But the attacker can use the software which …

Password Attacks Explained. How to defend against password attacks? Read More »

Anonymity (Explained). How to browse Anonymously?

What is Anonymous Browsing? Anonymous browsing refers to browsing the web content in such a way that it hides the user’s personal information. An attacker uses this in order to protect his identity during an unauthorized attack. Many of the normal people also wish to browse anonymously due to privacy. For security reasons, they don’t …

Anonymity (Explained). How to browse Anonymously? Read More »

Google Dorking

What is Google Dorking? Google Dorking or hacking involves the use of operators in the Google search engine to locate specific words or text strings within search results. It is basically an information-gathering technique. The attacker can use this technique to gain specific open-source sensitive information of the target. The hackers can also use google …

Google Dorking Read More »

Twitter Hack 2020: Massive Social Engineering Attack

Last year, high profile Twitter accounts like Bill Gates, Elon Musk, President Obama, Joe Biden, Kanye West got hacked. All taken over twitting about a cryptocurrency scam. In this Twitter hack, the attackers got access to internal Twitter admin tools. These tools gave them access to high profile Twitter accounts. They were able to bypass …

Twitter Hack 2020: Massive Social Engineering Attack Read More »

The 8 OPSEC rules: Implementing Operational Security

What is operational security? Operational security refers to the habits and behavior you perform to enforce good security. It is a procedure of risk management. This encourages people to view security in order to protect sensitive information. OPSEC was originally was a military strategy which then was opted by the private sector as well. The …

The 8 OPSEC rules: Implementing Operational Security Read More »