Techie Talks
-
Black Hat
Operating System Command Injection Vulnerabilities
O/S Command Injection Vulnerabilities: Another attack vector that is part of injection is operating system command injection. This occurs when…
Read More » -
Nmap
USING NMAP TO PERFORM AN XMAS SCAN
XMAS SCAN: In the computer world, a request for comments (RFC) is a document that contains either notes or the…
Read More » -
Web Server
Looking Closely at Web Servers
Web Servers: Before we can get into the process of analyzing and hacking web servers as well as applications, we…
Read More » -
Networking+
Understanding Wireless Devices
Wireless Devices: Mobile devices, including Smartphones, e-book readers, and tablet computers, are popular. Many of these devices use either RF…
Read More » -
Black Hat
EXTRACTING INFORMATION FROM E-MAIL SERVERS
E-Mail Servers: E-mail servers can provide a wealth of information for hackers and penetration testers. In many ways, e-mail is…
Read More » -
Black Hat
Using a Sniffer – Sniffer Tools
Using a Sniffer: We touched on some of the basics of using a sniffer in the previous section, but now…
Read More » -
Courses
Download Top 18 Ethical Hacking Books
Download Top 18 Most Amazing Books of Ethical Hacking: Hello, Everyone Today I am going to Share some of the…
Read More » -
Uncategorized
Kerberos: Cracking Kerberos
Kerberos: On the Microsoft platform, version 5 of the Kerberos authentication protocol has been in use since Windows 2000. The…
Read More » -
Black Hat
Planting a Backdoor – Using Netcat
Planting a Backdoor: There are many ways to plant a backdoor on a system, but let’s look at one provided…
Read More » -
Black Hat
DNS Spoofing – Performing DNS Spoofing
DNS Spoofing: DNS is an important service for just about any network today. Some networks, such as those that use…
Read More »