kunj
@kunjtechh
Tech enthusiast who is into cybersecurity looking to connect with like minded peoples Pursuing Diploma in Cyber Forensic and Information Security.
When you're alone, you think. When you think, you remember. When you remember, you feel pain. - Psychological Fact
Ffuf (fast web fuzzing/fuzzer)is used for fuzzing Get and Post data but can also be used for finding hidden files, directories or subdomains. It's quite hard to use it but can provide u some juicy information #cybersecuritytips #BugHunter #cybersecurity
Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules that help define malicious network activity and uses those rules to find packets that match against them and generates alerts for users. #cybersecurity
Create Excel file in Java using Apache POI #java #apachepoi #excel blackslate.io/articles/creat…
SQL injection, or SQLI, is a code injection technique that hackers use to attack data-driven applications by inserting malicious SQL statements into an entry field for execution. #CyberSecurity
A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall #cybersecurity
You can judge the character of a person by how they treat people who can do absolutely nothing for them.
According to one survey, 95% of people claim they get nervous when they hear “we need to talk.”
The Mobile Security Framework (MobSF) is an open-source research platform for mobile application security, encompassing Android, iOS, and Windows Mobile. MobSF can be used for mobile app security assessment, penetration testing, malware analysis, and privacy evaluation. #Security
An IMSI catcher can force a targeted smartphone to respond with its specific location using GPS or the signal strength of cell towers near the phone. This allows trilateration based on these towers' known locations. #cybersecurity #hackingtools
What is Cryptographic Failure? Cryptographic failures are where attackers often target sensitive data, such as passwords, credit card numbers, and personal information, when you do not properly protect them #securitybreach #Security #cybersecurity #cybersecuritytraining
What is an APT? An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, longterm presence on a network in order to mine highly sensitive data #cybersecurityprojects #cybersecurity
SNORT is a powerful open-source intrusion detection system (IDS) and intrusion prevention system (IPS) that provides real-time network traffic analysis and data packet logging. #cyberawareness #cybersecuritytraining
The Caesar cipher is a classic example of ancient cryptography and is said to have been used by Julius Caesar. The Caesar cipher involves shifting each letter of the plaintext message by a certain number of letters, normally three #cryptography
The Playfair cipher is a manual symmetric encryption method once used to secure sensitive military communications. It encrypts letters in pairs (digraphs), unlike traditional ciphers that encrypt one letter at a time. In this there are only 25 blocks 'i'&'j' are treated as same .
United States Trends
- 1. #FanCashDropPromotion 2,174 posts
- 2. Good Friday 62.8K posts
- 3. #FridayVibes 5,324 posts
- 4. #FursuitFriday 11.5K posts
- 5. Kenyon 1,176 posts
- 6. #FridayFeeling 2,822 posts
- 7. Happy Friyay 1,445 posts
- 8. #LastFourWatched N/A
- 9. Sedition 369K posts
- 10. LINGORM DIOR AT MACAU 648K posts
- 11. RED Friday 4,018 posts
- 12. Ja Rule 1,327 posts
- 13. Maggie 31.7K posts
- 14. woozi 44.8K posts
- 15. Eric Swalwell 4,293 posts
- 16. Mark Kelly 78.2K posts
- 17. Traitor 137K posts
- 18. ON SALE NOW 12.1K posts
- 19. Knox 6,496 posts
- 20. Allen 87.4K posts
Something went wrong.
Something went wrong.