top of page
Nov 19, 20243 min read
What are the common metasploit commands?
Metasploit Framework is one of the most powerful and leading penetration-testing tool written in Ruby, and also one of the biggest...
2 views
Nov 19, 20242 min read
How does an organization network diagram look like with all security components deployed?
The network diagram would change from one organization to other, but this is what a general network diagram looks like: Let’s discuss the...
8 views
Nov 19, 20242 min read
What is bind shell and reverse shell? Explain difference between them also explain what are different options in reverse and bind shell
Bind shell and Reverse shell are two different types of hacking techniques in order to gain unauthorized remote access to the compromised...
1 view
Nov 19, 20241 min read
What is LHOST and RHOST ? Explain in detail
LHOST (Local Host): This refers to the attacker's own system, the one from which the attack or exploit is initiated. It specifies the IP...
34 views
Nov 19, 20242 min read
All NMAP commands and why they are used?
The following are the fundamental nmap commands and their purpose as follows: Basic scan techniques: Scan name and their purpose NMAP...
16 views
Nov 18, 20241 min read
How to install wireshark in windows
A good tutorial on the installation of wireshark can be found below. https://www.youtube.com/watch?v=fpeMCuCKgHA To download Wireshark,...
0 views
Nov 18, 20241 min read
How can one setup a demo network? Where are the tools available for the same?
Setting up a demo network using Cisco Packet Tracer is a great way to simulate and practice networking scenarios without the need for...
0 views
Nov 18, 20242 min read
What are the common ports and how to remember them?
Your device might be streaming movies, receiving mail, and downloading files simultaneously even though it is connected with one single...
0 views
Nov 18, 20242 min read
What are the common nmap commands?
The abbreviation Nmap stands for Network Mapper. It is a Linux command-line tool that is open-source and used to scan IP addresses and...
1 view
Nov 15, 20241 min read
Explain all NMAP timing templates like T1, T2 etc
Nmap offers 6 timing templates which can be specified with -T option and their number from 0-to-5 or their name. The following -T0 as the...
4 views
bottom of page