Category: Tutorials

Learn how to do something step-by-step.

PenTest Edition: Active Reconnaissance and Port Scanning Using Nmap

Nmap, or "Network Mapper," is a network discovery, analysis, and auditing tool utilized by both network defenders and network attackers. As an exceedingly flexible tool with dozens of methods for mapping out networks, Nmap has become a critically acclaimed and well-supported cyber tool. Using Nmap, we can perform network sweeps to discover available hosts on ...

PenTest Edition: My Favorite Wi-Fi Assessment Tools – 2018

Penetration testing and security analysis is an integral aspect of cybersecurity. The ability to master some of these tools is certainly indispensable. Penetration testers and other cybersecurity professionals use these tools everyday to examine the security posture of their networks. All of these tools are free to download; however, whether you can use them or ...

PenTest Edition: Creating A Man-in-the-Middle Attack using Cain & Abel [Tutorial]

A man-in-the-middle attack occurs when an attacker sits in the middle of the communication between two victim devices, secretly relaying information back-and-forth on their behalf. It can be thought of as active eavesdropping. The attacker cannot only see the communication traveling to-and-from the victim devices, but can also inject his own malicious traffic. With this ...

Decrypting HTTPS Traffic

Hypertext Transfer Protocol over SSL (https)  is pretty decent security. This is because https uses the Secure Sockets Layer (SSL) encryption scheme to pass keys between two parties over the Internet. These days, however, most of our Web servers are utilizing Transport Layer Security (TLS 1.2), which is an updated version of SSL 3.0. Therefore, ...

What is the DARK WEB? How to Access It

Introduction: Ever wonder what lurks on the Dark Web? Hear any scary stories about contract killings? Weapons trading? Sex trafficking? Red rooms? These are all very real (with the exception of "red rooms." They are, by and large, more of a myth). At the surface, we have the Internet or the World Wide Web (WWW). ...