Category Cybersecurity

Types of Wi-Fi Connections

Encryption algorithms: RC4 AES Encryption protocols: Temporal Key Integration Protocol (TKIP) Cipher-block Chaining Message authentication Protocol (CCMP) Wi-Fi security modes: WEP WPA WPA2 Authentication options supported by WPA, WPA2 and WPA3: Preshared key (PSK) or personal (PER) IEEE 802.1X or…

Encryption Concepts for IT

This post tries to summarize the basic concepts of cryptography and encryption that are relevant to information technologies, computer science and cybersecurity. It tries to focus on the basic concepts. Technical details about mathematics, calculations or implementations (like encryption algorithms…

Cybersecurity Attack Phases

According to EC-Council EC-Council identify in the CEH course 5 hacking phases: Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks According to ISACA ISACA identify 8 phases in a cybersecurity generalized attack processs: Perform reconnaissance Create attack tools Deliver malicious…

Google Advance Search Tags

The exploit of these tags on cybersecurity (what is called ‘Google Hacking’) is documented in Exploit database in the section Google Hacking Database (GHDB). Google Advance Search Tags [cache:] [link:] [related:] [info:] [site:] [allintitle:] [intitle:] [allinurl:] [inurl:] [location:] [filetype:]  …