Silence is golden. Close those ports, with SSHepherd.

Fact: Nearly all internet connected devices will be port-scanned at some point in their lifespans. You want to know what most of the largest breaches of a decade or more have in common? Open, listening ports! Yes, you read that right. The bad guys scan for open, listening ports. Cybercriminals have relied on port scan … Continue reading Silence is golden. Close those ports, with SSHepherd.

Cyber Security Learning Path.

Hey guys, I know it’s been a while and I’m really sorry about that. This year threw me off kilter and I was having difficulties finding my drive and energy but I seem to be getting it back. Thanks for being patient with me. Alright, so a lot of people have been reaching out to … Continue reading Cyber Security Learning Path.

Additional scanning tools.

Scanning with Masscan. Hey there, it's been a minute. I've been so busy with my internship and personal stuff + my laptop kinda gave up on me and I had to use some scrappy slow, old piece of junk but I'm back now and we're back to learning and having some fun. I thought I'd … Continue reading Additional scanning tools.

ARP Spoofing.

Hey there, welcome to another section on this Python + Ethical Hacking course. In this section we're going to be building our own ARP spoofing program. Lets begin! In the previous post, we looked at ARP, what it is and how we can use it to discover all the connected clients in the same network. … Continue reading ARP Spoofing.

Introduction to Python Programming and Ethical Hacking.

Alright people, before we begin building our tools, I just have a few things to get across to you.• I'm going to start from the basics but I'll also assume that you know how to get your virtual machine, Kali Linux and editor installed and running.• I'll be using Kali Linux in Virtual box• I'll … Continue reading Introduction to Python Programming and Ethical Hacking.