So this weekend, I participated in a CTF challenge that was organized by GirlScript Goa. It was among the beginner level CTFs, so I was able to solve all but one problem. Nonetheless, I came in 3rd in this and here is my writeup for the solutions of the challenges that I solved. Miscellaneous Challenges […]
The second phase of ethical hacking and penetration testing involves two terms that are Vulnerability Scanning and Enumeration. Scanning involves taking the knowledge discovered during reconnaissance and using it to look at the network
Information gathering isn’t just a phase of security testing; it’s an art that each penetration tester and hacker should master. Let’s dive deeper into it.
The 5 Phases of Hacking are: Reconnaissance, Scanning, Gaining Access(Exploitation), Maintaining Access/Persistence and Clearing Tracks.
In the information security (InfoSec) community, “CIA” has nothing to try to to with a particular well-recognized US intelligence. These three letters stand for Confidentiality, Integrity, and Availability, also known as the CIA Triad. Together these principles are the foundation of any organization’s information security.
An Indian security researcher Bipin bragged a bounty of $31k from the tech giants facebook after the admitted that there was a blind SSRF in the internal systems.
IPv4 vs IPv6: Where did IPv5 go?
Every time you see some network settings, there is IPv4 or IPv6. As you can guess, the previous versions are long in the past (TCP/IP v1,v2, and v3). But why is it IPv4 vs IPv6 instead of the 5th version vs the 6th? How is that the IPv4 from the 80s is still around? Let’s find out!
TCP vs UDP: Unfolded
Before jumping to TCP vs UDP we must understand what TCP and UDP are. TCP and UDP are protocols that are a part of the transport layer in the OSI model. Both of these protocols are used for sending packets over the internet. They are built over the Internet Protocol(IP).
OSI Model is used to understand how data is transferred from one computer to another in a computer network. To accomplish successful communication between computers or networks of different architecture 7 Layer of OSI Model was defined consisting of Application, Presentation, Session, Transport, Datalink, and Physical layer.