What is Footprinting? What is Reconnaissance?

2020-12-11T13:56:30+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , |

Footprinting (also known as reconnaissance) commonly refers to one of the pre-attack phases; tasks performed before doing the actual attack. In other words, footprinting is the first step in the evaluation of the security posture of the target organization's IT infrastructure. During this phase, a hacker can collect the following information − Domain name IP [...]

Five Phases of Ethical Hacking

2020-09-01T12:45:08+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , |

In this post, we talked about the types of hackers. One of them is ethical hacker. We discuss about the five steps of ethical hacking now. Of course, not necessarily a hacker has to follow these 5 steps in a sequential manner: Note: Hacking is illegal. The only purpose of hacking is to secure [...]

Hacking & Hackers

2020-08-15T14:25:12+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. In other words, hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Businesses need to protect themselves against such attacks. Hacking is typically technical but hackers can also use [...]

Cyber Security

2020-09-23T13:18:18+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , , , , |

Cyber security is the practice of protecting systems, networks, and programs from digital attacks. It's also known as information technology security or electronic information security. Cyber-attacks are often aimed at accessing, changing, or destroying sensitive information. Final goal of these attacks is extorting money from users, or interrupting normal business processes in organizations, governments and [...]

Confidence Attacks and Romance Fraud Attacks

2020-09-23T13:11:08+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , |

These days, confidence attacks and romance fraud attacks are very common. An attacker deceives a victim into believing the attacker and the victim have a trust relationship, whether family, friendly or romantic. So, victim will trust to attacker. At this time, the attacker asks the victim to send money to the attacker. Or the victim may [...]

Pharming Attacks

2020-09-23T13:09:45+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , , , , |

Pharming is a type of cyber crime. It is very similar to phishing attacks. The Pharming attacks to name resolution process. However, There is a  DNS server in each network. In fact, each computer has its local DNS service. A pharming attack uses two way for attack to this process:   First Way More about hosts [...]

Go to Top