Introduction In this post, you will learn what is water holing and how it works and water is a type of social engineering attack. I have already written a post on what is social engineering and its most common type. To read...
Blog
Introduction Diversion theft: In this post, you will learn what is diversion thefts and how it works exactly. Diversion thefts is a type of social engineering attack. And I have already written a post on what is social...
Introduction In this post, you will learn what is pretexting and how pretextings works exactly and also we will see an example of pretexting. Pretextings is a social engineering attack. If you don’t know what is social...
Introduction In this post, you will learn what is phishing exactly and how it works. I have already written a post on 9 types of social engineering attacks. And phishings comes under social engineering attacks. So, please read...
Introduction In this post, you will learn what is dumpster diving and how it works. And a real example of dumpster diving is below this section. They are two types of dumpster diving the general one which is used in normal...
Introduction In this post, you will learn what is privilege escalation and its two types and in addition, you will see a differentiation table between vertical privilege and horizontal privilege escalation. And this post...
Introduction In this post, you will learn what is Ophcrack and how the tool works. This post is just an overview of the tool and I have written a post on how to work with this tool, A step by step guide. The post is available...
Introduction In this post, you will learn the security posture and the three postures in cybersecurity which is often spoken in the books and also the cybersecurity experts. What is security posture? Security...
Introduction In this post, you will learn what is Prismdump and how the tool works, Just an overview. Other than that I have written a separate post on how to work with Prismdump and the post is available in the hacking tools...