kunjtechh's profile picture. Tech enthusiast who is into cybersecurity looking to connect with like minded peoples

Pursuing Diploma in Cyber Forensic and Information Security.

kunj

@kunjtechh

Tech enthusiast who is into cybersecurity looking to connect with like minded peoples Pursuing Diploma in Cyber Forensic and Information Security.

What if u fly!


Is diploma=bachelor........


kunj 님이 재게시함

When you're alone, you think. When you think, you remember. When you remember, you feel pain. - Psychological Fact


Ffuf (fast web fuzzing/fuzzer)is used for fuzzing Get and Post data but can also be used for finding hidden files, directories or subdomains. It's quite hard to use it but can provide u some juicy information #cybersecuritytips #BugHunter #cybersecurity


Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules that help define malicious network activity and uses those rules to find packets that match against them and generates alerts for users. #cybersecurity


kunj 님이 재게시함

Smelling coffee can help reduce stress.


SQL injection, or SQLI, is a code injection technique that hackers use to attack data-driven applications by inserting malicious SQL statements into an entry field for execution.  #CyberSecurity


A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall #cybersecurity


kunj 님이 재게시함

You can judge the character of a person by how they treat people who can do absolutely nothing for them.


kunj 님이 재게시함

According to one survey, 95% of people claim they get nervous when they hear “we need to talk.”


The Mobile Security Framework (MobSF) is an open-source research platform for mobile application security, encompassing Android, iOS, and Windows Mobile. MobSF can be used for mobile app security assessment, penetration testing, malware analysis, and privacy evaluation. #Security


An IMSI catcher can force a targeted smartphone to respond with its specific location using GPS or the signal strength of cell towers near the phone. This allows trilateration based on these towers' known locations. #cybersecurity #hackingtools


What is Cryptographic Failure? Cryptographic failures are where attackers often target sensitive data, such as passwords, credit card numbers, and personal information, when you do not properly protect them #securitybreach #Security #cybersecurity #cybersecuritytraining


What is an APT? An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, longterm presence on a network in order to mine highly sensitive data #cybersecurityprojects #cybersecurity

kunjtechh's tweet image. What is an APT?
 An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, longterm presence on a network in order to mine highly sensitive data
#cybersecurityprojects #cybersecurity

SNORT is a powerful open-source intrusion detection system (IDS) and intrusion prevention system (IPS) that provides real-time network traffic analysis and data packet logging. #cyberawareness #cybersecuritytraining


The Caesar cipher is a classic example of ancient cryptography and is said to have been used by Julius Caesar. The Caesar cipher involves shifting each letter of the plaintext message by a certain number of letters, normally three #cryptography


The Playfair cipher is a manual symmetric encryption method once used to secure sensitive military communications. It encrypts letters in pairs (digraphs), unlike traditional ciphers that encrypt one letter at a time. In this there are only 25 blocks 'i'&'j' are treated as same .


United States 트렌드

Loading...

Something went wrong.


Something went wrong.