Blog

Difference between Standard and Extended ACLs (Access Control List)

ACL or access control lists are the set of rules that are used in networking devices such as routers for regulating the network

Read More
Blog

What is Whaling and How it Affects Your Organization

Whaling is a term that refers to A targeted Phishing Attack You Can’t Afford to Ignore. A particularly targeted phishing attempt called “whaling”

Read More
Blog

System Hacking using Metasploit

Hello everyone, in this article we see how we can get remote access to someone’s system by sending them a payload and when

Read More
Blog

Reporting Cybercrime in India: A Step-by-Step Guide to Seeking Justice

Before reporting a cyber crime we need to understand the nature of the crime for what purpose it is happening to you, and

Read More
Blog

Role of Artificial Intelligence in Digital Forensics

Author:- Riya GhoshDepartment of Forensic Science, Kristu Jayanti College Autonomous In today’s digitally connected world, the rise of cybercrime and cyberattacks has become

Read More
Scanning Network

What are the techniques used for discovering a host?

Gathering data on systems that are “alive” and responding on the network is the process of scanning. The first step in the network

Read More
Scanning Network

Network scanning tools for PC and Mobile devices

The network scanning tools are commonly used for discovering and identifying live hosts, open ports, running services, on a target network, location info,

Read More
Scanning Network

What are TCP/IP communication flags?

TCP transmission control protocols have communication flags in their header for controlling and managing the communication between two internet devices. The communication flags

Read More
Scanning Network

What is Network Scanning

Network scanning is the second phase in the ethical hacking methodology where we gather more detailed information about our target system for future

Read More
Information Gathering

How to use OSINT Framework for Footprinting Target

OSINT is short for open-source intelligence framework that focuses on gathering information about the target available over the internet. This framework helps security

Read More