What is domain name system (DNS) spoofing Domain Name Server (DNS) spoofing (a.k.a. DNS cache poisoning) is an attack in which altered DNS records are used to redirect online traffic to a fraudulent website that resembles its intended destination. Once there, users are prompted to login into (what they believe to be) their account, giving … More DNS Spoofing
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc. In this tutorial, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures … More How to Hack WiFi (Wireless) Network
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. The use of steganography can be combined with encryption as an extra step for hiding or protecting data. The word steganography is derived from the Greek words steganos (meaning hidden or covered) … More steganography
IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, to impersonate another computer system, or both. It is a technique often used by bad actors to invoke DDoS attacks against a target device or the surrounding infrastructure. Sending and receiving … More What is IP Spoofing?
Understanding the password-cracking techniques hackers use to blow your online accounts wide open is a great way to ensure it never happens to you. You will certainly always need to change your password, and sometimes more urgently than you think, but mitigating against theft is a great way to stay on top of your account security. … More The top ten password-cracking techniques used by hackers
A firewall is a network security device, either hardware or software-based, which monitors all incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or drops that specific traffic. Accept : allow the trafficReject : block the traffic but reply with an “unreachable error”Drop : block the traffic with no reply A firewall … More Introduction of Firewall in Computer Network
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix “crypt-” means “hidden” or “vault” — and the suffix “-graphy” stands for “writing.” In computer science, cryptography refers to secure information and communication techniques … More cryptography
A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems. Today I’ll describe the 10 most common cyber attack types: Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks Man-in-the-middle (MitM) attack Phishing and spear phishing … More Top 10 Most Common Types of Cyber Attacks
In this blog post, I will show you how to setup and install Kali Linux 2020.1b in VMware Workstation Player 15.5 which is the latest version of VMware Player. Step 1 – Download Kali Linux ISO image To install the Kali Linux, we will have to first get the installer ISO image file. You can … More How to install Kali Linux 2020.1 in VMware Workstation Player 15
The quieter you become, the more you are able to hear… – Kali Linux Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which … More What is Kali Linux?