Md Sohail Ansariblog.heysohail.me·Dec 16, 2022Advent Of Cyber 2022 Day 5 WalkthroughRemote Access Services You can easily control your computer system using the attached keyboard and mouse when you are at your computer. How can we manage a computer system that is physically in a different place? The computer might be in a separate r...Discuss#cybersecurity
Md Sohail Ansariblog.heysohail.me·Dec 13, 2022Advent Of Cyber 2022 Day 4 WalkthroughWhat is Scanning? Scanning is a set of procedures for identifying live hosts, ports, and services, discovering the operating system of the target system, and identifying vulnerabilities and threats in the network. These scans are typically automated ...Discuss·1 like·40 readsAdventOfCyber2022
Md Sohail Ansariblog.heysohail.me·Dec 4, 2022Advent Of Cyber 2022 Day 3 WalkthroughWhat is OSINT? OSINT is gathering and analyzing publicly available data. The information can be accessed via the open internet (indexed by search engines), closed forums (not indexed by search engines) and even the deep and dark web. People tend to l...Discuss·47 readstryhackme