Often, an exploitation of a vulnerability might lead to a disaster recovery scenario. Therefore, it is imperative to have a system in place that can prevent the vulnerabilities from being exploited in the first place. But how can you prevent …
As you might know, untrusted Wifi networks can be extremely dangerous if you happen to be connected to them. In this article I am going to show you how to create a simple yet dangerous access point. We will …
Hello everyone, In this article we will learn about Nmap Scripting Engine (NSE) after knowing this you will get to know about the real power of Nmap. So let’s get started 1. Nmap Installation If you are using Kali Linux …
Summary Of rConfig rConfig is an open-source network device configuration management utility for network engineers to take frequent configuration snapshots of their network devices. About The Exploit I was able two detect two remote command execution vulnerabilities in two …
AlienVault OSSIM generates various alarms, it’s possible that the analyst would miss some of the alarms that could have a devastating impact on our infrastructure. To cater for this scenario, we developed a system for automated response to ensure that …
Learn how to monitor architectural risk in this article by Neil Rerup, the person responsible for the security architecture for the Vancouver 2010 Winter Olympics and Milad Aslaner, a mission-focused security professional and an award-winning speaker and technical expert …