Cyber Kill Chain methodology

The “Cyber Kill Chain” methodology is a framework developed by Lockheed Martin to describe the stages of a cyberattack, from initial reconnaissance to data exfiltration.

Leggi Tutto »

Man In The Middle (MITM)

In the man in the middle attack the attacker will put himself in the middle of the communication between the victim and the other device,

Leggi Tutto »

SQL Injection

All websites that make interaction with a DB, use SQL. But if the SQL script is not correctly written could be passible of some manipulation

Leggi Tutto »

CEH

Scanning and Enumeration given the following IP 192.168.1.113, what are the IP running under this subnet? netdiscover -r 192.168.1.0/24 or nmap 192.168.1.0/24 NMAP (https://www.geeksforgeeks.org/nmap-cheat-sheet/?ref=ml_lbp) To

Leggi Tutto »

Steganography

Steganography is the practice of hiding a message inside of (or even on top of) something that is not secret. The steganography has the double

Leggi Tutto »

Metasploit

Metasploit Framework is a cybersecurity project that provides info about vulnerability, simplifies penetration tests and helps in the development of intrusions systems check. It is

Leggi Tutto »

WP Scan

WPScan is a tool designed to test the security of a WordPress web site. To use it, simply type: Adding -e u parameter it will

Leggi Tutto »

MAC Address

MAC stands for Media Access Control. It is a Permanent, Physical, Unique (in the world) “code” assigned to a physical object that allows to connect

Leggi Tutto »

Airodump-ng

With a wireless adapter in monitor mode you are able to sniff packet in the air: at least the one in our range even if

Leggi Tutto »