Network
-
Unveiling the Digital Landscape: A Deep Dive into Enumerating Applications on Web Servers
In the vast ecosystem of the internet, web servers stand as the cornerstone of digital interaction, serving up a plethora of applications and services to users worldwide. However, with this convenience comes a…
-
Safeguarding Your Website: Preventing Information Leakage Through Webpage Comments and Metadata
In today’s digital age, websites serve as the virtual storefronts for businesses, organizations, and individuals alike. However, amid the rush to create engaging and functional web experiences, security considerations can sometimes take a…
-
What and How : Cain & Abel
Cain and Abel is a password recovery tool that is often used in the field of cybersecurity. It is primarily designed for Microsoft Windows operating systems and has functionalities related to network analysis…
-
Information Gathering
Learning Objectives Recommended tools Note: IP/domain shown below are for example purpose only . Step 1: Host Discovery – Ping sweep Perform a ping sweep (not a port scan) on the entire netblock and write…
-
Man-in-the-middle Attack
A Man-in-the-Middle (MitM) attack is a form of cyber attack where an attacker intercepts and potentially alters the communication between two parties without their knowledge. The attacker positions themselves between the communicating parties,…
-
ARP Poisoning
ARP (Address Resolution Protocol) poisoning, also known as ARP spoofing, is a network attack in which an attacker sends false (spoofed) Address Resolution Protocol messages to the local area network. The goal of…