Malware and the risk to cybersecurity

| 0 comments

Malware is widespread and continues to grow with each passing day. There are even recent reports that adware vendors are actively purchasing Chrome extensions to peddle their adware and malware. If you are not familiar with what malware really is the jest of it is essentially malicious software. It many ways malware is a lucrative business but it is also very damaging and illegal. You need to understand that the delivery method of malware can include websites, email, electronic documents, and so much more. Think of it this way, the black hat finds a vulnerability which is a weakness in …

Continue reading

What is ping all about?

| 0 comments

If you have used a computer more than say a single day, I am sure that you are well aware of ping. If not, then you are in for a treat! Well I suppose it may not be a treat in some opinions, but this is an utility that you should take time to learn about and appreciate. Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. Ping operates by sending …

Continue reading

Down in the weeds with sqlmap

| 0 comments

Here I plan to take a look at sqlmap and the capabilities that it provides in order to identify weakness in security so that this weakness can be addressed before a breach occurs. The tool sqlmap, like many tools, can both be used for good and bad depending upon the role of the individual. I approach this tool as a mechanism to perform penetration testing in order to uncover the vulnerabilities that otherwise may go unnoticed. If you are not sure what sqlmap is the best way I can define this tool is that it is an open source penetration …

Continue reading

Hacking 103: Attacking servers snd services with Hydra

| 0 comments

Now that I have covered Hacking 101: Footprinting Using Nothing But A Web Browser and Hacking 102: Active Footprinting With Nmap it is time to move into a physical attack upon the servers and servers that we have found in the course of investigation. There are a number of tools available in Kali Linux which include Medusa and Ncrack, but for the purposes of this article will will be using Hydra which is a very fast network logon cracker which support many different services. In this article we will take a look at the following attacks which are FTP and …

Continue reading

Hacking 102: Active footprinting with Nmap

| 0 comments

This article is a followup of Hacking 101: Footprinting Using Nothing But A Web Browser which served as an introduction to passive footprinting. There are a number of tools that you can use both on a Windows and Linux platform and I prefer to use the Backtrack Linux distro for penetration testers, more specifically I will be using Kali Linux. If Linux is not your cup of tea then you can give the following tools a look and pick and choose what you need. Wireshark which open source multi-platform network protocol analyzer. It allows you to examine data from a …

Continue reading

Ways to protect your identity on the Internet

| 0 comments

At the time of this article I have an IP Address of 89.239.207.81 and I would ask you if you have any idea where my Internet Service Provider (ISP) resides? I live in the United States and at this moment my Internet connection is coming from Denmark. As demonstrated from the Google Map, I am clearly sitting  in Havdrup, Denmark however this is not true, well at least physically. My internet connection resides in Denmark why my physical location is within the United States. Here is the detailed information: IP Address: 89.239.207.81* City: Havdrup State: 20 Country: Denmark Latitude: 55.5333 …

Continue reading