How to enumerate Subdomains of an Organization
Netcraft Sublist3r Python script Example of use: sublist3r -d example.com -p 80 External references CEH v10: Module 2 Footprinting
Netcraft Sublist3r Python script Example of use: sublist3r -d example.com -p 80 External references CEH v10: Module 2 Footprinting
This post features different types of clouds. This post is part of the introduction to cloud computing. Virtual Private Cloud (VPC) Featured Cloud Deployment Models Cloud Deployment Models: Private Cloud: A private cloud, also known as internal or corporate cloud,…
Security Testing Methodologies: List of Security Testing Methodologies Open Web Application Security Project (OWASP) Open Web Application Security Project (OWASP) is the Open Web Application Security Project, which is an open-source application security project that assists the organizations to purchase,…
Types of Security Controls: Preventive: Prevent security violations and enforce various access control mechanisms. Detective: Detect security violations. Corrective or recovery: Used to restore systems. Deterrent: Used to discourage. Compensating: Used as an alternative control when the intended controls failed.…
This tutorial assumes that your operating system is Linux, in any of its variants (Kali Linux, Ubuntu, etc.) Step-by-step Procedure 1. Ensure aircrack-ng suite is installed in your computer Open a terminal and type: sudo apt-get update Install aircrack-ng suite:…
Encryption algorithms: Encryption protocols: Wi-Fi security modes: Authentication options supported by WPA, WPA2 and WPA3: PSK is the use of a static fixed password or authentication. ENT enables the leveraging of and existing AAA (Authentication, Authorization and Accounting) service to…
Before reading this article, you may find useful to have a look at the preliminary post about encryption concepts for IT, that explains step-by-step the needs for a Public Key Infraestructure. What is a Public Key Infrastructure (PKI)? When establishing…
This post tries to summarize the basic concepts of cryptography and encryption that are relevant to information technologies, computer science and cybersecurity. It tries to focus on the basic concepts. Technical details about mathematics, calculations or implementations (like encryption algorithms…
VirusTotal It was a Spanish company that was acquired by Google on 2012. Some projects like the exploiting tool TheFatRat asks to refrain users from uploading to Virus Total the malware created with this suite. The reason…