moulik

moulik

Pentesting DNS

Pentesting DNS

Introduction The first thing you do in Pentesting dns is figuring out the target’s IP address. This is called the Recon phase, where the real work begins. Once you have the IP address, you can dig deeper to find out…

Pentesting SMTP

pentesting smtp

Introduction Email spoofing is a way of sending fake emails to people. Criminals use these methods for attacks like phishing or spam, which can create hidden access points that look legitimate. Public email servers can be exploited for spoofing attacks.…

Pentesting Telnet

pentest telnet

Introduction Pentesting Telnet might sound like a throwback to the early days of the internet, but it’s a crucial skill in today’s cybersecurity landscape. Telnet, despite being largely replaced by more secure protocols, still pops up in various network configurations,…

Pentesting SSH

SSH PENTEST

Introduction The SSH protocol, also called Secure Shell, lets you safely and reliably log in from one computer to another. It provides strong ways to verify identity and protects communication with strong encryption. SSH is a secure alternative to unprotected…

Pentesting FTP

Pentesting FTP

Introduction In this article, you will learn how to pentesting FTP Port 21, If you have any doubts comment down below. What is FTP FTP (File Transfer Protocol) is a service, or protocol, designed for transferring files between computers using…