Silence is golden. Close those ports, with SSHepherd.

Fact: Nearly all internet connected devices will be port-scanned at some point in their lifespans. You want to know what most of the largest breaches of a decade or more have in common? Open, listening ports! Yes, you read that right. The bad guys scan for open, listening ports. Cybercriminals have relied on port scan … Continue reading Silence is golden. Close those ports, with SSHepherd.

Metasploit Tips :

View all productivity tips with the tips command 1. Enable verbose logging with set VERBOSE true2. When in a module, use back to go back to the top level prompt3. Tired of setting RHOSTS for modules? Try globally setting it with setg RHOSTS x.x.x.x4. Enable HTTP request and response logging with set HttpTrace true5. You … Continue reading Metasploit Tips :

Device Hardening

Device hardening involves implementing proven methods of securing the device and protecting its administrative access. Some of these methods involve maintaining passwords, configuring enhanced remote login features, and implementing secure login with SSH. Defining administrative roles in terms of access is another important aspect of securing infrastructure devices because not all information technology personnel should … Continue reading Device Hardening

Man In The Middle Attack (MITM)

There are 7 types of MITM attacks.Cybercriminals can use MITM attacks to gain control of devices in a variety of ways.  IP spoofing Every device capable of connecting to the internet has an internet protocol (IP) address, which is similar to the street address for your home. By spoofing an IP address, an attacker can … Continue reading Man In The Middle Attack (MITM)