Jonas Satkauskascybr.hashnode.dev路Dec 20, 2024Today I've learned: Changing Shell Prompt Name/PATH importance (Environment variables)Prompts in Kali Usually terminal in Kali looks like this (username@hostname)-[current_directory] # When you work as a root you see: (root@kali)-[current_directory] # Environment variable which is used to change the prompt There鈥檚 a PS1 Environment ...10 likescybr
Ronald Bartelshubandspoke.amastelek.com路Dec 19, 2024馃憡The Pareto Principle | A Key to Effective Cybersecurity Strategy馃The Pareto Principle, also known as the 80/20 rule, states that roughly 80% of outcomes result from 20% of causes. In the context of business cybersecurity, this principle can be a powerful framework for focusing on the most impactful actions to enha...7 likesPareto Principle
Ronald Bartelshubandspoke.amastelek.com路Dec 19, 2024馃П馃敟Simplifying Vulnerability Scanning Across Multiple DMZs on a Fortinet Firewall馃殥In today鈥檚 complex network environments, businesses often use multiple DMZs to isolate different public-facing services for enhanced security. However, running vulnerability scans across these DMZs can become challenging, particularly when managing a...7 likesVulnerbility Scanning
Nachiket Patelplasmorix.hashnode.dev路Dec 15, 2024Wi-Fi Hacking: Deauthentication AttackDisclaimer: This blog is intended solely for educational and ethical purposes. The information provided here is aimed at raising awareness about cybersecurity threats and promoting the importance of securing wireless networks. All activities were con...29 readsDeauthentication Attack
Satvik Vemulapallianonbash.hashnode.dev路Dec 12, 2024Basic Port Scans - NMAPNmap Basic Port Scans INTRODUCTION The next step would be checking which ports are open and listening and which ports are closed. Therefore, in this room and the next one, we focus on port scanning and the different types of port scans used by nmap. ...Network Mapper - NMAPnmap
Ronald Bartelshubandspoke.amastelek.com路Dec 12, 2024馃攼Why Businesses Should Avoid Operator-Locked Devices馃泤In today's cybersecurity landscape, businesses cannot afford to leave their network security and control in the hands of third-party operators. Using a device managed and locked down by an Internet Service Provider (ISP) or operator may seem convenie...1 likecybersecurity
Madhav Maheshwariwhy-refresh-access-tokens-matter.hashnode.dev路Dec 12, 2024Why Refresh & Access Tokens Matter ?Why Refresh & Access Tokens Matter for Authentication and Authorization In today鈥檚 digital world, making sure users are who they say they are (authentication) and giving them the right permissions (authorization) is key to a secure web experience. Bu...secure authentication
Ronald Bartelshubandspoke.amastelek.com路Dec 9, 2024馃獤Understanding Cyber-Attacks | How Common Network Flood Attacks Work 馃挘Cyber-attacks targeting networks are becoming increasingly sophisticated, and businesses must understand how these attacks function to defend their infrastructure effectively. This article focuses on several common cyber-attacks, particularly Distrib...10 likescyber attcks
Ronald Bartelshubandspoke.amastelek.com路Dec 8, 2024馃懞The Hidden Dangers of Mobile Networks in Business-Critical Systems | Why Serious Cybersecurity Means No LTE馃ぅWhen it comes to cybersecurity, not all connectivity options are created equal. In South Africa, mobile networks have become the primary conduit for cyberattacks. Businesses relying on LTE for critical systems or as branch links are exposing themselv...3 likesLTE
Ronald Bartelshubandspoke.amastelek.com路Dec 8, 2024馃帣锔廢nderstanding DDoS Amplification Attacks | The DNS Amplification Threat馃帶Distributed Denial of Service (DDoS) amplification attacks are one of the most devastating methods attackers use to overwhelm networks and servers. By exploiting misconfigured services like open DNS resolvers, attackers can multiply their attack traf...10 likesddos