The Blog.
Long-form research.
Practitioner-written research, technical guides, and explainers for analysts, defenders, and learners. Every piece is hand-edited and updated as the threat landscape changes.
The Rise and Role of Cyber Warfare Specialists
Conflicts have crossed the physical boundaries and entered the vast, interconnected realm of cyberspace in the digital age. Cyber warfare specialists are the vanguards of t…
The Unified Kill Chain: A Comprehensive Approach to Cybersecurity Defense
The environment of cyber threats is always changing, therefore defense tactics need to be proactive and flexible. Conventional models such as the Cyber Kill Chain and MITRE ATT&CK have yielded insightful informati…
Hydra.: A Comprehensive Guide to Automated Password Cracking and Enumeration
One of the most important tools that any cybersecurity expert should have in their toolbox is Hydra. It is intended to assist you in automating the service enumeration and password-cracking process for various protocols.
SMB (Server Message Block) Service Enumeration
In the ever-evolving landscape of cybersecurity, understanding and securing network services is paramount. SMB (Server Message Block) is a critical protocol used for file sharing and network communication in many en…
How to use L2 Switch in GNS3 for additional security features
You can greatly improve your practice sessions if you study for the Cisco pass tests by adding a Layer 2 switch to GNS3. Creating a new project, choosing the device type, and adjusting its settings are all necessary w…
How to use CeWL tool for wordlist generation
Generating word list from target website using CeWL Custom wordlist generator CeWL is a command line tool available in Linux OS for generating a wordlist from the given domain by spidering it in depth. It is a ruby ap…
8085 vs 8086 Microprocessors
Although Intel produced both the 8085 and 8086 microprocessors, their architectures differ, and they are utilized in various kinds of applications. A microprocessor is a single integrated circuit (IC) or chip that hou…
Linux SSH Server gets Infected with Tsunami botnet malware
An unknown attacker is brute-forcing Linux SSH servers to install various malware, including the Tsunami DDoS (distributed denial of service) bot, ShellBot, log cleaners, privilege escalation tools, and an XMRig (Mone…
Difference between Standard and Extended ACLs (Access Control List)
ACL or access control lists are the set of rules that are used in networking devices such as routers for regulating the network traffic between the devices or interfaces. ACLs are used to allow or deny the network bet…