Introduction In this post, you will learn what is phishing exactly and how it works. I have already written a post on 9 types of social engineering attacks. And phishings comes under social engineering attacks. So, please read...
Tag - Security
Introduction In this post, you will learn what is dumpster diving and how it works. And a real example of dumpster diving is below this section. They are two types of dumpster diving the general one which is used in normal...
Introduction In this post, you will learn what is privilege escalation and its two types and in addition, you will see a differentiation table between vertical privilege and horizontal privilege escalation. And this post...
Introduction In this post, you will learn what is Ophcrack and how the tool works. This post is just an overview of the tool and I have written a post on how to work with this tool, A step by step guide. The post is available...
Introduction In this post, you will learn the security posture and the three postures in cybersecurity which is often spoken in the books and also the cybersecurity experts. What is security posture? Security...
Introduction In this post, you will learn what is Prismdump and how the tool works, Just an overview. Other than that I have written a separate post on how to work with Prismdump and the post is available in the hacking tools...
Introduction In this post, you will learn what is TCPdump and how it works, just an overview and I have written a separate post on how to download and work with the tool and the post is in the hacking tools menu. What is...
Introduction In this post, I have given an overview or summary of the Nessus tool. I am not teaching how to work with this tool and I have separately written a post on how to work with this tool. The post is available in the...
Introduction In this post, you will learn what is Cain and Abel and how the tool works. This post is just an overview or a summary of the tool. If you wanted to know how to work with the tool, I have written a post step on...