The 5 Phases of Hacking

In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done … Continue reading The 5 Phases of Hacking

Top 15 Cyber Attack Maps for Visualizing Incidents

What is a DDoS Attack? First, we must define the meaning of a DDoS attack. DDoS attacks are a main concern in internet security, and many people misunderstand what exactly they are. A Distributed Denial of Service (DDoS) attack is a malicious attempt to upset typical internet traffic of a targeted server by overwhelming it … Continue reading Top 15 Cyber Attack Maps for Visualizing Incidents

Top 15 Essential Open Source Security Software and Tools

Hey everyone? How are you? Today i would like to touch on security by listing(with links) The Top Open Source Security Tools i personally recommend. Many of these tools can be used by anyone. So let's hop in! Notice: If you are interested in testing these tools they are all available to download and use … Continue reading Top 15 Essential Open Source Security Software and Tools

FSociety: A Penetration Testing Framework

Penetration Testing also known as Ethical Hacking is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. It can either be automated with software applications or performed manually. FSociety is an open source penetration testing framework that consists of a variety of hacking tools … Continue reading FSociety: A Penetration Testing Framework

Most Common Hacking Techniques

What Are Top 10 Common Hacking Techniques? PhishingDenial of Service [ DoS/DDoS ]Waterhole attacksFake WAPEavesdroppingKeyloggingVirus, TrojanClick JackingCookie theftBait & switch Phishing When a hacker uses phishing, he usually replicates a very popular site with the idea of making the user sign in and use his credentials in there. The hacked information will be used on the … Continue reading Most Common Hacking Techniques