GnuPG {PGP Keys}

  Index Introduction GnuPG OpenPGP Installation Use Encryption with phrase Generating Keys Adding More Information to the Keys Managing Keychain Exporting / Importing Keys Exporting Importing Encrypting files with keys Decrypting files with keys Using Servers Sending Keys Downloading Keys Conclusion References Introduction Gnu Privacy Guard [0] (or GnuPG, or further reduced GPG) is an…Read more GnuPG {PGP Keys}

Auditing and creating vulnerability analysis report with Nessus

  Nessus is one of the best tools to do vulnerability assessment, due to present an interactive interface and be able to generate and robust reporting. We will bring here how to install it, and how to make a vulnerability assessment (scanning) on ​​the target, showing some of its features such as report generation. Entering…Read more Auditing and creating vulnerability analysis report with Nessus

What’s Worse: APTs or Spear Phishing?

In this article, we are going to look into advance persistent threat (APT) and spear phishing, the role of spear phishing in APT attacks, the level of difficulty to perform APT attacks or spear phishing attacks, and, last but not least, the comparison of damage caused by an APT attackand spear phishing. But, before we…Read more What’s Worse: APTs or Spear Phishing?

How Can We Protect Our Website By Common Web Attacks

  How Can We Protect Our Website By Common Web Attacks ? On this post i am telling about five types of common web attacks, which are used in most types of defacements or dumps of databases. Following five exploits are listed SQL injection, XSS, RCE, RFI, and LFI. Most of the time, we missed…Read more How Can We Protect Our Website By Common Web Attacks


Introduce: Personal software firewalls * Personal firewalls are applications that protect an individual computer from unwanted Internet traffic. Exampls: windows firewall, zone-alarm, ipfirewall (Mac OS). Personal firewall: + promp the user for permission to enable particular applications to access the Internet. + have the capability to detect intrusion to a computer an block that intrusion.…Read more SECURITY BASICS PART 3


Localized Authentication Technologies There are several types of technologies for authenticating a user to a local area network. Examples that are software-based include LDAP and Kerberos, whereas an example that includes physical characteristics would be 802.1X. Keep in mind that there is a gray area between localized and remote authentication technologies. I’ve placed each technology…Read more SECURITY BASICS PART 2


Remote Authentication Technologies + Remote Access Service Remote Access Service (RAS) began as a service that enabled dial-up connections from remote clients. One of the best things you can do to secure a RAS server is to deny access to individuals who don't require it. And monitor the logs that list who connect on a…Read more SECURITY BASICS PART 1

Cyber Attacks Explained: Packet Spoofing

Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service attack, which we discussed in detail. This month, we will cover the packet-spoofing attack, which is found to be a favourite among hackers, and widely used in exploiting network vulnerabilities. We…Read more Cyber Attacks Explained: Packet Spoofing

Cyber Attacks Explained: Network Sniffing

This month, let us focus on a wider hacking approach called network sniffing, which is very commonly used by prying hackers. We will look at a few tools typically used as sniffers and also figure out how to protect IT infrastructure from such attacks. Sniffing involves capturing, decoding, inspecting and interpreting the information inside a…Read more Cyber Attacks Explained: Network Sniffing