When you're alone, you think. When you think, you remember. When you remember, you feel pain. - Psychological Fact
Ffuf (fast web fuzzing/fuzzer)is used for fuzzing Get and Post data but can also be used for finding hidden files, directories or subdomains. It's quite hard to use it but can provide u some juicy information #cybersecuritytips #BugHunter #cybersecurity
Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules that help define malicious network activity and uses those rules to find packets that match against them and generates alerts for users. #cybersecurity
Create Excel file in Java using Apache POI #java #apachepoi #excel blackslate.io/articles/creat…
SQL injection, or SQLI, is a code injection technique that hackers use to attack data-driven applications by inserting malicious SQL statements into an entry field for execution. #CyberSecurity
A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall #cybersecurity
You can judge the character of a person by how they treat people who can do absolutely nothing for them.
According to one survey, 95% of people claim they get nervous when they hear “we need to talk.”
The Mobile Security Framework (MobSF) is an open-source research platform for mobile application security, encompassing Android, iOS, and Windows Mobile. MobSF can be used for mobile app security assessment, penetration testing, malware analysis, and privacy evaluation. #Security
An IMSI catcher can force a targeted smartphone to respond with its specific location using GPS or the signal strength of cell towers near the phone. This allows trilateration based on these towers' known locations. #cybersecurity #hackingtools
What is Cryptographic Failure? Cryptographic failures are where attackers often target sensitive data, such as passwords, credit card numbers, and personal information, when you do not properly protect them #securitybreach #Security #cybersecurity #cybersecuritytraining
What is an APT? An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, longterm presence on a network in order to mine highly sensitive data #cybersecurityprojects #cybersecurity
SNORT is a powerful open-source intrusion detection system (IDS) and intrusion prevention system (IPS) that provides real-time network traffic analysis and data packet logging. #cyberawareness #cybersecuritytraining
The Caesar cipher is a classic example of ancient cryptography and is said to have been used by Julius Caesar. The Caesar cipher involves shifting each letter of the plaintext message by a certain number of letters, normally three #cryptography
The Playfair cipher is a manual symmetric encryption method once used to secure sensitive military communications. It encrypts letters in pairs (digraphs), unlike traditional ciphers that encrypt one letter at a time. In this there are only 25 blocks 'i'&'j' are treated as same .
United States 트렌드
- 1. Texans 23K posts
- 2. James Cook 3,309 posts
- 3. Sedition 217K posts
- 4. #TNFonPrime 1,198 posts
- 5. Lamelo 9,115 posts
- 6. #MissUniverse 32.8K posts
- 7. Cheney 101K posts
- 8. Treason 115K posts
- 9. Prater N/A
- 10. Paul George 1,835 posts
- 11. TMNT 5,875 posts
- 12. Seditious 120K posts
- 13. #iubb N/A
- 14. Commander in Chief 62.5K posts
- 15. Go Bills 9,330 posts
- 16. #HTownMade 1,063 posts
- 17. Constitution 132K posts
- 18. UCMJ 12.1K posts
- 19. UNLAWFUL 91.4K posts
- 20. Last Ronin 3,282 posts
Something went wrong.
Something went wrong.