The Equinix Attack: Understanding Ransomware Behaviour
According to the United State’s Cybersecurity and Infrastructure Security Agency (CISA), the number of ransomware attacks around the world has increased, and the Computer Emergency Response Team (US-CERT) states that this sort of breach hits a target every 14 seconds.
SSL/TLS History: Discovering Service Encryption
Privacy in peer-to-peer communications throughout the World Wide Web has become an extremely widespread issue, especially over the last few years.
dnsmap: an Old-School Network Recon Tool
When it comes to the vast array of open source tools available to the infosec community in 2020, one could say we’re spoiled.
RustScan: Empowering Nmap One Scan at a Time
We all love Nmap, we really do. It’s one of the first and most famous OSINT-like security tools created, written almost 23 years ago (at the time of this writing) by Gordon “Fyodor” Lyon.
Recon-ng: An Open Source Reconnaissance Tool
The OSINT tools arsenal is now filled with more pieces of code that help “get things done” better, faster and more effectively than ever before. And Recon-ng, with its modular design, brings you a familiar way to operate a command line while its similar syntax to the Metasploit framework allows you to mount different purpose modules and configure them independently.
DNS Privacy: Minimizing end-to-end Exposure
The Domain Name System (DNS) is one of the most important services running behind the scenes that allows the Internet to work effectively every day. Also, it’s one of the most forgotten and abused which was covered previously in the “DNS attacks” article. Today we’ll address some of the ins and outs of its inner workings and review some helpful resources that will help minimize the chances of traffic sniffing (password leaking anyone?).
IVRE: A Versatile Network Reconnaissance Framework
Being an infosec researcher requires more than just installing Kali Linux and watching a few YouTube tutorials. Being able to navigate the hundreds of tools available at your fingertips and knowing which tool is best for the job requires a good amount of self-learning or, at the very least, finding in-depth reviews to help you figure things out.
Security Automation: Definition, Benefits, Best Practices and Tools
Even if some people believe that robots and automation will replace the entire workforce and machines will do everything for us, the truth is that automation helps us to be more productive and work more efficiently. It relieves us from the most tedious and monotonous tasks in our daily work and lives.
Gophish: An Open-Source Phishing Framework
If you or any friend, family member, or acquaintance has ever used an email account, chances are that at some point, they’ve received a phishing email. And while during the early stages of the internet, such deception usually looked so fake and misaligned that you could spot it right away as an attempt to mislead you, this isn’t so true anymore.
Top 9 Internet Search Engines Used by Security Researchers
We all know what internet search engines are, and why they’re used. Even when you want to search for the most mundane thing ever, you can go to Google, Bing, Safari, or any of the other traditional web browsers. But what if you need access to information not usually found on those popular search engines?