DevSecOps
-
Safeguarding Your Website: Preventing Information Leakage Through Webpage Comments and Metadata
In today’s digital age, websites serve as the virtual storefronts for businesses, organizations, and individuals alike. However, amid the rush to create engaging and functional web experiences, security considerations can sometimes take a…
-
What and How : Cain & Abel
Cain and Abel is a password recovery tool that is often used in the field of cybersecurity. It is primarily designed for Microsoft Windows operating systems and has functionalities related to network analysis…
-
Information Gathering
Learning Objectives Recommended tools Note: IP/domain shown below are for example purpose only . Step 1: Host Discovery – Ping sweep Perform a ping sweep (not a port scan) on the entire netblock and write…
-
Man-in-the-middle Attack
A Man-in-the-Middle (MitM) attack is a form of cyber attack where an attacker intercepts and potentially alters the communication between two parties without their knowledge. The attacker positions themselves between the communicating parties,…
-
ARP Poisoning
ARP (Address Resolution Protocol) poisoning, also known as ARP spoofing, is a network attack in which an attacker sends false (spoofed) Address Resolution Protocol messages to the local area network. The goal of…
-
MAC Flooding: Understanding the Attack
MAC flooding is a network attack that exploits the limitations of network switches by flooding the switch’s MAC address table. This attack aims to overload the table, causing the switch to operate in…