Phishing Attack Of course, the only purpose of the attack is not to steal the user's password information. The purpose of such attacks is to exploit the human factor, the weakest link in the chain. Attackers use phishing attacks as the first step to infiltrate systems. Phishing attack is a type of attack aimed at … Continue reading Get The Hook, Lets Phish.
Ethical Hacking
Cyber Security Learning Path.
Hey guys, I know it’s been a while and I’m really sorry about that. This year threw me off kilter and I was having difficulties finding my drive and energy but I seem to be getting it back. Thanks for being patient with me. Alright, so a lot of people have been reaching out to … Continue reading Cyber Security Learning Path.
Additional scanning tools.
Scanning with Masscan. Hey there, it's been a minute. I've been so busy with my internship and personal stuff + my laptop kinda gave up on me and I had to use some scrappy slow, old piece of junk but I'm back now and we're back to learning and having some fun. I thought I'd … Continue reading Additional scanning tools.
DNS Spoofing.
DNS (Domain Name Server): is a special server designed to resolve domain names into IP addresses. So when a user sends a request to a particular server asking to load up a web page, because computers on the net communicate using IPs and not domain names, they need to transfer the request over to the … Continue reading DNS Spoofing.
Packet Sniffer.
Alright guys. In the previous post, we built a program that allows us to run an ARP spoofing attack, redirecting the flow of packets in the network and places us in the middle of the connection. Meaning, every data sent or revived from our target machine goes through our own computer, allowing us to see … Continue reading Packet Sniffer.