Category: Threats & Vulnerabilities

Learn about the different types of threats facing our networks and systems

Your Live Security Camera Footage May Be Broadcasted Online: And You Wouldn’t Know!

Live video feeds of home and commercial surveillance cameras around the globe are being broadcasted live and without permission on a site called Insecam, which is believed to have originated from Russia. Other sites like Shodan and Nestcamdirectory also provide visitors with the ability to look up IP cameras; however, Insecam aggregates these live video streams all into one ...

Session Hijacking Attacks Explained

Today, I'll discuss "Session Hijacking" attacks. But first, we need to understand what a cookie is. What are "Cookies?"A "cookie" is nothing more than a simple text file containing an arbitrary string of characters. When you visit many of your favorite web sites, the web server stores a cookie on your HD, allowing it to ...

PenTest Edition: Wi-Fi Testing with Wifite

Wifite is another wireless auditing tool that comes prepackaged in Kali Linux. This is perhaps the easiest tool so far, seeing as it automates the entire process, making it much easier for penetration testers to quickly test the security of wireless networks. You may be wondering if it's okay to display the SSIDs and BSSIDs ...

What is Snort? Bonus: How to Write Snort Rules!

Snort is an open-source, signature-based Network-based Intrusion Detection System (NIDS). Actually, Snort is much more than just a NIDS because it also acts a packet analyzer and a Network-based Intrusion Prevention System (NIPS). Snort was originally developed to be a packet analyzer, and with such sniffing capabilities, it can be used to detect intrusions on ...

Identifying Network-Related Symptoms of Cyberattacks

Let's assume you have the architecture of your network already established, but you'd like to able to detect any signs of malicious traffic traversing in and out of your network. One of the things your might want to consider is placing sensors in strategic locations of your network. Intrusion Detection Systems (IDSs) and Intrusion Prevention ...