Home Offensive Security

Offensive Security

ios

Acquiring data from an iOS device

What are Data Acquisition methods in general? An interesting topic to know about in the domain of mobile forensics is data acquisition. But why is it important to get to know about...
Burp Suite

Burp Suite

What is Burp Suite? When it comes to the field of securing web applications, the tool of Burp Suite arises shiningly. PortSwigger Security is the responsible company of producing Burp Suite developed...
ssh-login

OpenSSH-PuTTY-SSH

What is PuTTY? Let's get some background on the topic first of all. PuTTY on its own has no meaning. However, it is a free and open-source software. In fact, it is...
wireless

Kismet Wireless

What is Kismet? It is very important for specialists in the domain of computer security or particularly information security to know about Kismet and what it can do. Fundamentally, Kismet is...
ssh-port

How to understand SSH perfectly?

Throughout the following lines, I will be walking through some of the main steps which have to be essentially followed in order for someone new to the field of security administration...
ssh-secure

How to play around with SSH protocol?

Know what is port forwarding? So, we got to know that to establish a tunnel, port forwarding has to become real. How can this be done? Firstly, port forwarding or as...
Burp Suite

Burp Suite Workshop

Burp Suite is one of the most popular web application security testing tools. It has a ton of features and can do everything from intercepting and modifying HTTP requests/responses in real...
ssh-port

How to perform Time Scheduling on an SSH Port?

How to perform Time Scheduling on an SSH Port?  Running services on a server could be further secured by a network administrator by getting the tasks scheduled. SSH service could be scheduled as...
ssh-tunneling

How to Perform Remote SSH Tunneling?

What is Remote SSH Tunneling? Imagine that you belong to a company where there are a plenty of internal websites available only inside the network of such company. But however, you are in need...
ssh-tunnneling

How to perform Local SSH Tunneling?

How to secure an SSH connection? What is Local SSH Tunneling? What happens when local SSH Tunneling occur? Basically, the host and port values get translated to the host and port values of the remote end of the channel....