Tag security

Digital Certificates

Digital certificates, also known as public key certificates or identity certificate. When I explain what a digital certificate to someone without a strong IT background I like to compare it with a seal ring, like the ones used in medieval…

How to get CISSP Certification

CISSP (Certified Information Systems Security Professional) is an information security certification granted by organization (ISC)2. This post explains the procedure to get CISSP certification through a series of frequently asked questions (FAQs) that are set in logical order. All questions…

How to get OSCP Certification

OSCP (standing from Offensive Security Certified Practitioner) is a certificate issued by American company Offensive Security. It is focused on penetration testing using Linux-based operating system Kali Linux, that is maintained also by Offensive Security. The purpose of this post…

Wireshark

      Filters TCP Ports tcp.port Filters the tcp port/s of packets displayed. Example: tcp.port == “21”   HTTP Request Methods http.request.method Possible values: get post Example: http.request.method == “POST”   Contains cookies http.cookie Example: http.cookie   External references…

List of Footprinting Tools

In the context of cybersecurity, footprinting is the technique used for gathering information about computer systems and the entities they belong to. This post may mix footprinting and reconnaissance tools. This post lists some footprinting tools. List of footprinting tools…