When you're alone, you think. When you think, you remember. When you remember, you feel pain. - Psychological Fact
Ffuf (fast web fuzzing/fuzzer)is used for fuzzing Get and Post data but can also be used for finding hidden files, directories or subdomains. It's quite hard to use it but can provide u some juicy information #cybersecuritytips #BugHunter #cybersecurity
Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules that help define malicious network activity and uses those rules to find packets that match against them and generates alerts for users. #cybersecurity
Create Excel file in Java using Apache POI #java #apachepoi #excel blackslate.io/articles/creat…
SQL injection, or SQLI, is a code injection technique that hackers use to attack data-driven applications by inserting malicious SQL statements into an entry field for execution. #CyberSecurity
A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall #cybersecurity
You can judge the character of a person by how they treat people who can do absolutely nothing for them.
According to one survey, 95% of people claim they get nervous when they hear “we need to talk.”
The Mobile Security Framework (MobSF) is an open-source research platform for mobile application security, encompassing Android, iOS, and Windows Mobile. MobSF can be used for mobile app security assessment, penetration testing, malware analysis, and privacy evaluation. #Security
An IMSI catcher can force a targeted smartphone to respond with its specific location using GPS or the signal strength of cell towers near the phone. This allows trilateration based on these towers' known locations. #cybersecurity #hackingtools
What is Cryptographic Failure? Cryptographic failures are where attackers often target sensitive data, such as passwords, credit card numbers, and personal information, when you do not properly protect them #securitybreach #Security #cybersecurity #cybersecuritytraining
What is an APT? An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, longterm presence on a network in order to mine highly sensitive data #cybersecurityprojects #cybersecurity
SNORT is a powerful open-source intrusion detection system (IDS) and intrusion prevention system (IPS) that provides real-time network traffic analysis and data packet logging. #cyberawareness #cybersecuritytraining
The Caesar cipher is a classic example of ancient cryptography and is said to have been used by Julius Caesar. The Caesar cipher involves shifting each letter of the plaintext message by a certain number of letters, normally three #cryptography
The Playfair cipher is a manual symmetric encryption method once used to secure sensitive military communications. It encrypts letters in pairs (digraphs), unlike traditional ciphers that encrypt one letter at a time. In this there are only 25 blocks 'i'&'j' are treated as same .
United States 트렌드
- 1. #FanCashDropPromotion 2,502 posts
- 2. Ukraine 417K posts
- 3. #FridayVibes 5,728 posts
- 4. Good Friday 65.2K posts
- 5. #FursuitFriday 11.5K posts
- 6. Kenyon 1,340 posts
- 7. #pilotstwtselfieday N/A
- 8. SINGSA LATAI EP4 97.3K posts
- 9. #สิงสาลาตายEP4 96.2K posts
- 10. ON SALE NOW 12.2K posts
- 11. Happy Friyay 1,596 posts
- 12. Ja Rule 1,450 posts
- 13. Sedition 369K posts
- 14. woozi 52.7K posts
- 15. LINGORM DIOR AT MACAU 697K posts
- 16. RED Friday 4,273 posts
- 17. Mark Kelly 78.1K posts
- 18. Eric Swalwell 4,650 posts
- 19. Maggie 32.5K posts
- 20. Dubai Air Show 55.4K posts
Something went wrong.
Something went wrong.