-
XZ Utils Backdoor
What is XZ Utils, and what is the XZ backdoor? XZ Utils and its underlying library liblzma is a free software tool that implements both XZ and LZMA, which are two compression/decompression algorithms…
-
What and How : Cain & Abel
Cain and Abel is a password recovery tool that is often used in the field of cybersecurity. It is primarily designed for Microsoft Windows operating systems and has functionalities related to network analysis…
-
MAC Flooding: Understanding the Attack
MAC flooding is a network attack that exploits the limitations of network switches by flooding the switch’s MAC address table. This attack aims to overload the table, causing the switch to operate in…
-
What is Sniffing ?
Network Sniffing: A Comprehensive Explanation Network sniffing refers to the practice of intercepting and inspecting data packets as they flow across a computer network. This process is often conducted for legitimate network monitoring…
-
What is RDP, How to enumerate for privilege escalation.
RDP stands for Remote Desktop Protocol. It is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user…
- BufferOverflow, CyberSecurity, DevSecOps, DoS, Firewall, Kali Linux, Malware, Network, Snort Signature, wireshark
Exploitation : Heartbleed Vulnerability : Ubuntu Server 12.04
What is Heartbleed Vulnerability? It’s a vulnerability in the OpenSSL Cryptographic software Library, where it doesn’t do bound check for input validation in the heartbeat extension where data can be accessible then it…