‘theHarvester’ is a tool designed to be used in the early stages (Information Gathering Phase) of a penetration test. As the name suggests, ‘theHarvester’ is used to harvest/gather sensitive information that can help in determining a companyβs external …
In this video we are gonna look into Tshark and how to use it for network forensics. If you don’t know Tshark, it is basically the little brother of wireshark, you can think of it as a command line version …
Iβd like to thank Bruno Fedrici PhD in Physics and Quantum Technologies Advisor for the resources and advice on the subject. We had the opportunity to meet through the Microsoft AI class led by the programming school Simplon in Lyon. …
As we all know Metasploit is a huge framework and can be used to do a lot of tasks. In this article we will see how to use Metasploitβs auxiliary modules. These modules are very helpful in so many scenarios …
One of the most common questions that I get is “how do I become a hacker?”, the answer to this really depends on why you want to become a hacker? what are you trying to achieve? In this video I …
AlienVault OSSIM generates various alarms, it’s possible that the analyst would miss some of the alarms that could have a devastating impact on our infrastructure. To cater for this scenario, we developed a system for automated response to ensure that …