Nessus vulnerability scanner is what it does say on the tin: A vulnerability scanner. Using techniques similar to Nmap, but presenting the information in a beautiful GUI.
Continue Reading#FromZeroToHacker
Day 076 #FromZeroToHacker – Hydra for beginners
Hydra is a brute force online password cracking program and a quick system login password hacking tool. Hydra can run a list and brute-force authentication services, especially if they have weak passwords.
Continue ReadingDay 075 #FromZeroToHacker – Nmap for beginners
Proper enumeration should be done before any exploitation attempts are made, as the more knowledge we have, the more vectors attack we may use.
Continue ReadingDay 072 #FromZeroToHacker – History of Malware
“Malware” consists of two words combined: “Malicious” and “Software”. Malware is designed to damage computers and/or networks.
Continue ReadingDay 071 #FromZeroToHacker – Encryption – Crypto 101
Cryptography is used to protect confidentiality, ensure integrity and authenticity. Even if we don’t notice, we use encryption daily.
Continue ReadingDay 070 #FromZeroToHacker – John the Ripper
John the ripper is one of the most used hash cracking tools out there. Fast, great range of hash types and loads of tutorials and information.
Continue ReadingDay 069 #FromZeroToHacker – Hashing – Crypto 101
Hashing is the process of transforming a given key or string of characters into another value. This is especially useful when we are dealing with passwords.
Continue ReadingDay 068 #FromZeroToHacker – Common cyber attacks
Using the internet is something common nowadays, so it is imperative that we understand and can protect ourselves against common attacks.
Continue ReadingDay 067 #FromZeroToHacker – Security Awareness
Based on a report from IBM, human errors were the main reason for 95% of successful cyber attacks. That is why security awareness is so important.
Continue ReadingDay 066 #FromZeroToHacker – XML eXternal Entity (XXE) attacks
XXE injection is a web security vulnerability that allows an attacker to interfere with an application’s processing of XML data. Let’s learn the different ways we can do this.
Continue Reading