Hacking

Anatomy of an APT attack: Step by step approach

This article will explore the technique, design and the inner workings of an APT (Advanced Persistent Threat) attack. It will also relate various stages of a

Hotspot honeypot

The Hotspot Honeypot is an illegitimate Wi-Fi access point which can appear as an authorized and secure hotspot. Despite appearances, it is actually set up b

QRL jacking

Quick Response Code Login Jacking (also known as QRL Jacking) is a social engineering attack by which the attacker can hijack the session, affecting all appl

Log analysis for web attacks: A beginner's guide

It is often the case that web applications face suspicious activities due to various reasons, such as a kid scanning a website using an automated vulnerabili

Vulnerability scanning with Metasploit part I

Metasploit Framework, the Metasploit Project's best-known creation, is a software platform for developing, testing, and executing exploits. It can be used to

Anatomy of an attack: gaining reverse shell from SQL injection

SQL injection opens a lot of possibilities for an attacker like dumping the database, causing denial of service, or stealing sensitive information. But it be

Nmap cheat sheet: From discovery to exploits, part 2: Advance port scanning with Nmap and custom idle scan

This is our second installment of the Nmap cheat sheet. Basically, we will discuss some advanced techniques for Nmap scanning and we will conduct a Man In Th

Nmap cheat sheet: From discovery to exploits - Part 1: Introduction to Nmap

As always during reconnaissance, scanning is the initial stage for information gathering. What is reconnaissance? Reconnaissance is to collect as much as i

How to Complete a Vulnerability Assessment with Nessus

In this lab, we will show you how to conduct and analyze a vulnerability risk assessment using the popular vulnerability scanning tool Nessus. We will:

ICMP attacks

ICMP stands for Internet Control Message Protocol and is the most used protocol in networking technology. A connectionless protocol, ICMP does not use any po