Home Offensive Security

Offensive Security

tcpdump

TCP Dump

What is tcpdump? Tcpdump is considered a great security tool to depend on whenever connecting a computer or a device to a particular network that permits packets of type Transmission Control Protocol/Internet...
Snort

Snort

 What is Snort? One of the most important open source projects in the field of network security is Snort. It has proved itself as one of the best network security tools for...
Cain and Abel

Cain and Abel

What is Cain and Abel? One of the most highly rated security tools according to sectools.org website is Cain and Abel. This complete name is not usually used among computer communities since...
John the Ripper

John the Ripper

What Is John the Ripper? One of the best security tools which can be used to crack passwords is John the Ripper. It has a high rank between all of its other...
Netcat

Netcat

Introduction to Netcat Reading from and writing to a network connection through protocols like Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) are always considered a great step for both a...
backtrack

Backtrack

Background to Backtrack You must have come across with the word Backtrack when it comes to hacking on Linux operating system. If you have never heard the word and further worked on...
Penetration Testing

How Can a Penetration Testing Lab Be Built For Android?

Concepts we need to understand first of all: Penetration Testing Penetration Testing: It is highly probable that you have heard of penetration testing at some point while investigating through the topic...
miami

Miami Cyber Take-Over

This isn’t your ordinary hacking class – this is NOT about how to use Nessus, this is not about how to use Metasploit, this is not about how to use Kali...
Firewall-infosec

What is meant by a firewall in network security?

Almost all small, medium and large organizations use the internet and have a connection to a company’s network. At the boundary of the organization network, there must be a partition of...
cybercrime

How to Operate in a Cyber Crime Marketplace?

Background: Cyber crime describes any identity theft or fraud happening through computer networks and devices. It is arguably one of the most rampant and modern crimes nowadays. In a marketplace, cyber...