In this video we are gonna look into Tshark and how to use it for network forensics. If you don’t know Tshark, it is basically the little brother of wireshark, you can think of it as a command line version …
I’d like to thank Bruno Fedrici PhD in Physics and Quantum Technologies Advisor for the resources and advice on the subject. We had the opportunity to meet through the Microsoft AI class led by the programming school Simplon in Lyon. …
As we all know Metasploit is a huge framework and can be used to do a lot of tasks. In this article we will see how to use Metasploit’s auxiliary modules. These modules are very helpful in so many scenarios …
One of the most common questions that I get is “how do I become a hacker?”, the answer to this really depends on why you want to become a hacker? what are you trying to achieve? In this video I …
AlienVault OSSIM generates various alarms, it’s possible that the analyst would miss some of the alarms that could have a devastating impact on our infrastructure. To cater for this scenario, we developed a system for automated response to ensure that …
Today I will discuss the top 10 hacking tools used in 2019. These tools can be installed on most operating systems (Windows, Linux or OS X) and are easy to use. I compiled this list of tools based on their …