Technology
Hello Readers, hope you all are doing well, my name is Vineet Singh. This is the first post of our XXE series. In this post, we are going to know about XML External Entity Injection vulnerability. What is XML? XML is an abbreviation of “Extensible Markup Language”. It is a markup language like HTML(HyperText Markup Language), which is used to store and transport the data. […]
We all use Spyware to keep track or monitor someone’s activities for different purposes. It is now being used all around the world to steal data from business systems. It is acknowledged as one of the most creepy forms of malware. We are here to dig in deep and help you get closer to this pervasive type of cyber fraud so that you can remain […]
CHFI v10 Exam Questions In this CHFI v10 exam question set, we are giving you an overview of the CHFI exam. Our purpose in providing you this set of CHFI v10 Exam questions is to make you familiar with the types of questions asked in the CHFI Certification exam. Here are some mock Questions and Answers that will help you prepare better for the CHFI […]
CHFI v10 Study Guide CHFI Stands for Computer Hacking Forensic Investigator. Here we will talk about the CHFI v10 Study Guide and the importance of Forensics and how EC-Council’s Certified Hacking Forensic Investigator (CHFI) is going to help people who seek careers in Digital Forensics. CHFI is a lab Focused Program in the market that gives Enterprise’s vendor-neutral Training in Digital Forensics.One who seeks to […]
2021 Cyber Attacks, The beginning of a new age. The Age of Data has begun. From cookies to our social media profiles, everything we do online and even offline leaves traces in data. So, how much data is there? By 2025, the globe will have 200 zettabytes of data stored, according to Cybersecurity Ventures. To put 200 zettabytes into perspective, one zettabyte is equivalent to a thousand […]
Hello Guys, Today we are going to see some interesting topic, You can say an Important Protocol to remember SPANNING TREE PROTOCOL: Spanning tree protocol is a layer 2 Protocol being used in Switches and bridges to avoid Loops in the topology. For better understanding, First we will get to know what is Loops and why we need to avoid them. SCENARIO: Look at the […]
Hello Everyone, Hope you are doing well… Today we will discuss about SQL Injection. What is SQL Injection? SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, […]
Hey Guys, Back again with the Second blog in our Email Pentesting Series. Today we will be doing SMTP Service Fingerprinting and will get to know about Directory Harvest Attacks, and Enumeration of SMTP Subsystems and Features. So lets do it. For SMTP Fingerprinting am going to use Vulnerable Metasploitable Machine Here as victim. My Kali Linux will be the Attacker Machine. ATTACKER MACHINE IP […]
In today’s world, organizations depend heavily on information technology for protecting vital information. This information is associated with areas of finance, research and development, personnel, legality, and security. Vulnerability assessments scan networks for known security weaknesses. Attackers perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems. The identified vulnerabilities are used by attackers to further exploit that […]
Greetings, Hope everyone is safe and Secure In this series of Blogs, we will be learning how to do Email Penetration Testing. Methodology to carry out in Pentesting Email We will be doing lots of Things in this Series of Blogs. They are Introduction to Email Security Commonly Used Email Service Protocols Prerequisites for Email Penetration Testing Email Pentesting Steps SMTP Fingerprinting Directory Harvesting Attacks […]