Uncategorized
Hello Everyone, Hope you are doing well… Today we will discuss about SQL Injection. What is SQL Injection? SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, […]
Hey Guys, Back again with the Second blog in our Email Pentesting Series. Today we will be doing SMTP Service Fingerprinting and will get to know about Directory Harvest Attacks, and Enumeration of SMTP Subsystems and Features. So lets do it. For SMTP Fingerprinting am going to use Vulnerable Metasploitable Machine Here as victim. My Kali Linux will be the Attacker Machine. ATTACKER MACHINE IP […]
Welcome Everyone, It is the 3rd Part of Blog in our Series of Windows Endpoint Security, Today we will discuss about Securing the Windows Share in Active Directory. Assigning unwanted permissions for a user in a shared directory will guide the attacker to carry out numerous ways of accessing the shares. It is our responsibility to secure the Active Directory Shares by restricting the Permission. […]
Hello Everyone, This is our Second Part of Blog in our Windows Endpoint Security. In this Part we are going to discuss about Microsoft Security Baseline Configurations. Security Administrators use toolkit such as Microsoft Security Compliance Toolkit to compare endpoint configurations with Microsoft’s recommended Security Guidelines in managing Enterprise Group Policy Objects. Here we will discuss microsoft’s recommended tool Microsoft Security Compliance Toolkit (MSCT). It […]
Hello Everyone, Today we are discussing here about System Security or Endpoint Security It’s every IT Professional to secure your data With Multi Layer Protection, We will talk about Windows Systems in here. Your Basic Windows Systems have Multilayer Protection to protect your data. We will discuss about how to secure your Windows Systems in Four Different Methods. They Are Bios Password Login Password SysKey […]
Greetings, Scanning Beyond IDS and Firewall and Firewall Evasion concepts confused beginners a lot. It’s not about sending payload beyond IDS and Firewall. Its about Evaluating the Security measures of the Perimeter devices such as Firewall and IDS ( Intrusion Detection System) Our Job is not to Hack here. Its all about verifying things are in proper place or not. So here we are to […]