Posts

MITM Attack

Image
MITM Attack In this post you are going to learn, what is MITM attack, examples, phases, preventions & tools to perform MITM Attack. What is MITM Attack  - A man-in-the-middle or person-in-the-middle (PITM) is a type of cyberattack where an attacker places himself between two users or computers and tries to intercept the data or alters the data or steals the data and forwards it to the sender/receiver. One more form of MITM is MITB i.e. man-in-the-browser where in, an attacker places a bot in the browser to steal the details of the users and then sends it to an attacker. Example - There are two users - A, B & there is an attacker in between them. User A asks user B to send public key of user B so that user A can encrypt the message and send it to the user B. User B sends it's public key to user A, since an attacker is in between them he gets the public key of user B and sends it's own public key to the user A. User A thinks the public key he received is of user B so he

What is DNS, how it works?

Image
What is DNS, how it works? In this blog you're going to learn about DNS and how does it work. Computer's only understands binary language i.e 0s and 1s, but have you ever thought, while searching any website on internet you always type in characters and not number's so how computer's understand what do we want? Here comes the role of a DNS. DNS stands for Domain Name System which is more or less similar like our contact list in our phone book. While saving our friend's or relative's no. in our contact we save by adding name so that it will be easy for us in case we are searching them because it's slightly difficult to remember the number's of all our friend's. The case is different if you are too smart though. Likewise DNS also consist of the names of it's respective IP addresses. For instance the IP address of google.com is 172.217.160.206 but it's quite difficult to remember the IP address of all domain names so we have domain name system

Sniffing

Image
Sniffing In this blog you are going to learn what is sniffing ? types of sniffing, tools and protocols that are vulnerable to sniffing attacks . Sniffing is the process of monitoring and capturing all the packets through a given network. This work is assigned to network/system administrator to monitor network traffic. Attackers use this method to capture data packets containing sensitive information such as passwords, account information etc. Sniffers can be hardware or software. It is also called as wiretapping because you may have seen this situation where a third person bugs a telephone line to hear a conversation, it's the same method only an attacker sniffs network in this case. Types of Sniffing  Now you are going to see what are the types of sniffing. Active Sniffing Passive Sniffing Active Sniffing :  If an attacker tries active sniffing it will lock, monitor and also alter the data packets in some way. Active sniffing is

Nmap Cheat Sheet

Image
Nmap Cheat Sheet Nmap stands for Network Mapper which is used to detect if a system has any open port, to detect the OS of the target machine, to see IP address by adding host name, version detection and much more. You will learn the basic commands of Nmap which are commonly used and everyone should be aware of. To perform Nmap scan in Windows you must install Nmap software and perform the further activity.  In Linux OS you will find Nmap in Information Gathering tab or open terminal, type nmap and type the following commands.                  To scan a single IP   : nmap 192.168.1.1 To scan a host : nmap example.com  To scan a range of IP's : nmap 192.168.1.1-20 To scan a subnet   : nmap 192.168.1.0/24 To scan a single port : nmap -p 22 192.168.1.1 To scan a range of ports : nmap -p 1-100 192.168.1.1 To scan 100 most common ports fast : nmap -F 192.168.1.1 To scan all 65535 ports : nmap -p- 192.168

Port scanning

Image
Port Scanning In computer networking a port is used to run services, a communication endpoint. A port is a point through which information flows from a program to your computer or to your computer from an internet or another computer in a network. A port has three different meanings - hardware port, internet port number, to port a software program from one platform to another.   There are total of 65,535 ports in internet protocols. Scanning is the second step of hacking followed by footprinting . In footprinting we gather as much information we can of our target. Port Scanning is one of the most popular techniques attacker use to discover services they can exploit to break into your computer system, according to SANS institute. Through Scanning an attacker will be able to find out - if the server is alive or not, an IP address of a target machine, system's architecture, services running on each system. Tools used for port scanning  Solarwinds Advance

Interesting facts to be learnt from China.

Interesting facts to be learnt from China!   Bharat Wasiyo Abhi Toh Jaag Jaao!! As we are aware that our nation is deteriorating since past few months because of a dangerous pandemic that is been transmitted knowingly to create a havoc in the situation. We all know the source of this deadly virus, we all know people behind this, more or less W e all know the intention of this widespread disease. But it's not the end there are some more facts about China from which you are uninformed but not for too long!! Today people across the globe uses internet and the most used search engine is Google ,   you are probably reading this from Google or any other alternative search engine like DuckDuckGo or Bing  but does China also uses Google ? In January 2010 Google announced that Chinese hackers were attacking on them and other US tech companies and since then Google is no longer providing services to China. Baidu is the no. 1 search engine in China. The most used socia

Goals of cyber security

Image
Goals of cyber security With lots of information being generated by an organization today, as we know the world is going digital, every piece of information is more or less stored in a software and as a user we must ensure our data is been stored in a secured website and as an organization it's their responsibility to keep the data confidential, maintain integrity and available as an when required. Most commonly termed as a CIA triad. Three most important goals of cyber security are as follows :  Confidentiality -  The principle of confidentiality ensures that only the sender and the recipient(s) should be able to access the contents of a message. Confidentiality gets compromised if an unauthorized person gets an access to a message. E.g  User A wants to send message to user B, another user C gets access to this message which is not desired and thus defeats the purpose of confidentiality. let's say A sends a confidential email to B which is acc