Hello Everyone, Hope you are doing well… Today we will discuss about SQL Injection. What is SQL Injection? SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users,Read More
Blog
Hey Guys, Back again with the Second blog in our Email Pentesting Series. Today we will be doing SMTP Service Fingerprinting and will get to know about Directory Harvest Attacks, and Enumeration of SMTP Subsystems and Features. So lets do it. For SMTP Fingerprinting am going to use Vulnerable Metasploitable Machine Here as victim. My Kali Linux will be the Attacker Machine. ATTACKER MACHINE IPRead More
In today’s world, organizations depend heavily on information technology for protecting vital information. This information is associated with areas of finance, research and development, personnel, legality, and security. Vulnerability assessments scan networks for known security weaknesses. Attackers perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems. The identified vulnerabilities are used by attackers to further exploit thatRead More
Greetings, Hope everyone is safe and Secure In this series of Blogs, we will be learning how to do Email Penetration Testing. Methodology to carry out in Pentesting Email We will be doing lots of Things in this Series of Blogs. They are Introduction to Email SecurityCommonly Used Email Service ProtocolsPrerequisites for Email Penetration TestingEmail Pentesting StepsSMTP FingerprintingDirectory Harvesting AttacksNTLM Overflows AttackCrack Email PasswordsChecking againstRead More
Welcome Everyone, It is the 3rd Part of Blog in our Series of Windows Endpoint Security, Today we will discuss about Securing the Windows Share in Active Directory. Assigning unwanted permissions for a user in a shared directory will guide the attacker to carry out numerous ways of accessing the shares. It is our responsibility to secure the Active Directory Shares by restricting the Permission.Read More
Hello Everyone, This is our Second Part of Blog in our Windows Endpoint Security. In this Part we are going to discuss about Microsoft Security Baseline Configurations. Security Administrators use toolkit such as Microsoft Security Compliance Toolkit to compare endpoint configurations with Microsoft’s recommended Security Guidelines in managing Enterprise Group Policy Objects. Here we will discuss microsoft’s recommended tool Microsoft Security Compliance Toolkit (MSCT). ItRead More
Hello Everyone, Today we are discussing here about System Security or Endpoint Security It’s every IT Professional to secure your data With Multi Layer Protection, We will talk about Windows Systems in here. Your Basic Windows Systems have Multilayer Protection to protect your data. We will discuss about how to secure your Windows Systems in Four Different Methods. They Are Bios PasswordLogin PasswordSysKey PasswordBitLocker ProtectionRead More
Greetings, Scanning Beyond IDS and Firewall and Firewall Evasion concepts confused beginners a lot. It’s not about sending payload beyond IDS and Firewall. Its about Evaluating the Security measures of the Perimeter devices such as Firewall and IDS ( Intrusion Detection System) Our Job is not to Hack here. Its all about verifying things are in proper place or not. So here we are toRead More
Best Cyber Security tools to protective hardware, software, and knowledge from attackers. It protects against cyber-attacks like accessing, changing, or destroying sensitive data. Cyber security has become a hot hokum recently, with everybody talking regarding however vital it’s to stay safe whereas browsing on-line. the matter is that everybody talks regarding it, however most of the people don’t savvy to follow correct net security. EvenRead More