If you have heard of WannaCry or NotPetya, you have most likely heard of EternalBlue. EternalBlue exploits the flaws in the SMBv1 protocol. Although it was patched back in 2017, it's still at large today.......
Not all websites make it easy and publish everything on sitemap.xml or robots.txt. Sometimes you have to use some nifty tools in order to sniff out hidden directories. Below is a simple guide on how you can do this.....
Hack The Box: Forest
Grabify is a service that can help you identify who is on the receiving end of your chats or emails. You may have heard of the service as it has been made popular by the TV show Catfish....
Password protecting your files using a password is a great way to add additional security controls. The problem is, there are tools out there that can crack them. You may also be in a situation where you can't remember the password of a file.
The second part to checking how exposed you are online.
Protecting shared service accounts is always a hard task, especially when they have admin privileges. Here is a few things you can do to help you protect them using MFA.
Google dorking or Google Hacking is a hacking technique that uses the advance search functionality in Googles search engine.
Malicious parties are constantly trying to trick people in order to make some personal or financial gain. They spent quite a bit of time creating fake websites and spoofing emails in order to trick you into giving them information. This could be your payment information, credentials or other personal details that they can either use or sell. With all this going on, how can you be sure that those emails and links are genuine?
If you're a large organization, hiring a Cyber security firm to audit your security posture is a no brainer. Everything is exploitable and thinking that you are 100% secure nowadays is naive. You can purchase the best of the best security stack but no matter what, there will always be a weak chain somewhere. This is why these services exist. So that they help identify the gaps and help re-mediate them before someone malicious exploits them.