FIKARA BILALbilaldotcom.hashnode.dev·Apr 15, 2024The gaining access phaseIntroduction The Gaining Access phase in penetration testing represents a pivotal point where ethical hackers try to penetrate a target system's defenses. This article will explore the complexities of this phase, examining the techniques, tools, and ...Discuss#cybersecurity
REHAN ALIdignitas.hashnode.dev·Apr 6, 2024CodifyIP: 10.10.11.239 Starting with the nmap scan nmap -sC -sV -o nmap 10.10.11.239 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-04-03 05:33 EDT Nmap scan report for 10.10.11.239 Host is up (0.20s latency). Not shown: 997 closed tcp ports (conn-ref...Discusshacking
Prajoti Raneprajotirane.hashnode.dev·Apr 6, 2024Target Data Breach: A Case Study in Cybersecurity Failures and Lessons LearnedIn the annals of cybersecurity breaches, few incidents have had the lasting impact and repercussions as the Target data breach of 2013. This watershed moment not only exposed the vulnerabilities of one of America's largest retailers but also served a...DiscussTarget data breach, cybersecurity failures, cyber attack timeline, technical details of breach, breach mitigation strategies, security measures, lessons learned from breach
Yarelys Riverayarelysrr.hashnode.dev·Apr 5, 2024Safeguard Your Code: 6 Basic Vulnerabilities to Avoid and Tips to Improve Your Code SecurityIn the coding world, even the smallest oversight can pave the way for security vulnerabilities, leaving your application susceptible to exploitation by malicious actors. Cybersecurity incidents are rising and will continue as long as there is vulnera...Discusscode security
Prajoti Raneprajotirane.hashnode.dev·Apr 3, 2024Dissecting the Estonia DDoS Attack: A Technical Expedition into Cybersecurity's CoreDissecting the Estonia DDoS Attack: A Technical Expedition into Cybersecurity's Core Introduction: The Estonia DDoS (Distributed Denial of Service) attack of 2007 stands as a pivotal moment in the chronicles of cyber conflict, marking a significant ...Discuss·29 readsddos attacks
Jay Tillublogs.jaytillu.in·Mar 18, 2024What is a Firewall in Networking?A firewall is a security system that acts as a gatekeeper for your computer network. It monitors incoming and outgoing traffic based on a set of rules, deciding whether to allow or block specific data packets. In essence, it creates a barrier between...DiscussNetworking#cybersecurity
Jay Tillublogs.jaytillu.in·Mar 15, 2024What is the WEP Protocol in Networking?The Wired Equivalent Privacy Protocol, often abbreviated as WEP, was an early attempt to secure wireless network communication. It was introduced as part of the original IEEE 802.11 wireless networking standard, which is commonly known as Wi-Fi. Desi...DiscussNetworkingWEP
Jay Tillublogs.jaytillu.in·Mar 15, 2024Difference between POP, IMAP and SMTPEver wondered how your email magically appears on your phone, computer, or tablet? The answer lies in a trio of hardworking protocols: POP (Post Office Protocol), IMAP (Internet Message Access Protocol), and SMTP (Simple Mail Transfer Protocol). Each...DiscussNetworking#cybersecurity
Jay Tillublogs.jaytillu.in·Mar 15, 2024What is SMTP in Networking?SMTP, or Simple Mail Transfer Protocol, is the standard protocol used for sending email messages across networks. SMTP isn't directly involved with how you view or manage your emails. Instead, it acts as the communication channel between email client...DiscussNetworkingSecurity
Jay Tillublogs.jaytillu.in·Mar 15, 2024What is Internet Message Access Protocol (IMAP)?Imagine checking your work email on your computer, then replying to the same message later from your phone, and finding it seamlessly updated on both devices. This magic lies in a clever protocol called IMAP (Internet Message Access Protocol). IMAP: ...DiscussNetworkingprotocols