In the previous article, we had gone through IoT Security as an overview. Now is the time to learn about the protocols … [Read More...]
Featured Articles
Rust for Security Engineers
The past several years have seen an explosion of hype about Rust. For 6 years in a row, devs have voted Rust as the most … [Read More...]
IoT Security (An Overview)
Before diving into IoT Security, it is important to know what is IoT and why we need it. IoT stands for Internet of … [Read More...]
Editorial Picks
Latest Blog Updates
What are Linux Headers – How to Install Linux Kernel Headers on Kali?
A computer or software program contains multiple source files. Many source files need common declarations and functions to operate. Instead of reproducing the same code in each source file, separate files are introduced as an interface between the source files. These files are known as header files. The concept of Linux headers is similar to these header files. The Linux-headers is a package that provides an interface between Kernel internal components, and between Kernel and external memory resources. The kernel is the core program in any Operating System (OS). When an OS boots; Kernel loads after boot loader. … [Read More...]
How to install Tails OS on VirtualBox
It is pretty easy to install a Debian-based Linux distro like the Tails OS. Though it can be installed similar to windows, there is an easier and recommended method. That is to use it in a plug-and-play sandbox environment. We can set up a live environment with DVD, USB flash drive, and VirtualBox. VirtualBox makes it most easier to try out any operating system within another one. And it doesn’t cause security issues. Follow this guide for proper protocols for installing Tails OS on Virtualbox. If we are not careful on the internet, we may leave traces of sensitive information or even tracker. For this … [Read More...]
How to Use Netcat as a Persistent Backdoor Utility?
Metasploit is a handy Cybersecurity framework that has a number of payloads and exploits to help people with various penetration testing challenges. The payloads in Metasploit are classified into (i) Single and (ii) Stager modules. A single is a self-contained payload that operates independently. The stager payloads are host-dependent as they establish a connection between the target and host machines with the help of payload components called stages. Meterpreter and shell are well-known examples of Metasploit stages. The stagers can create single or recurrent backdoors for the users. A single backdoor is a … [Read More...]
How To Secure Kali Linux and Ensure Your Protection
Open-source Debian-based Linux distribution system Kali Linux is a powerful tool mostly used for offensive security. Previously known as Backtrack Linux, the system is a symbol for security itself. Used by students aimed to learn in-depth computing and seasoned veterans practicing penetration testing and stuff. But to run Kali Linux with the default settings may not be a good idea. Why? Because default settings are easy to crack, and as the OS is open-source itself, anyone has the right to modify it. Anyway, they want. And it includes making backdoors for running public systems. So, it depends on how a user … [Read More...]
How To Use Hydra with Burp Suite – Step-by-Step Guide
Overview The massive global community and security enthusiasts practice website password cracking regularly. Most of the time, it is to test the vulnerability of services that helps services in return. Nonetheless, it takes a great amount of technical knowledge, practice, and patience. Various tools and different variables are required to gain appropriate results. This is where THC-Hydra and Burp Suite comes in handy. Hacking passwords of online services like website authentication, email, and social media accounts falls under penetration testing. Though cracking or hacking online services is not the same as … [Read More...]