Woke up this morning and found two emails from domaincorp.org in my Inbox stating my domains are being used for spamming and spreading malware recently. Subject line contained “Domain Abuse Notice” which looked serious!
Read More »Setup honeypot in Kali Linux
The Pentbox is a safety kit containing various tools for streamlining PenTest conducting a job easily. It is programmed in Ruby and oriented to GNU / Linux, with support for Windows, MacOS and every systems where Ruby is installed. In this small article we will explain how to set up …
Read More »OSI Layers – Please Do Not Tell Secret Passwords Anytime
I had an interesting day at work trying to figure out how best I can setup a service for a client who is sending UDP licensing traffic through some high-end networking devices over VPN. UDP by design is unreliable. This was causing issues as the UDP packet size was over the …
Read More »Advantages disadvantages of using Proxy vs VPN vs TOR vs TOR and VPN together.
What makes you truly anonymous and leaves next to no trace in the internet? In this post I will discuss the advantages disadvantages of Proxy vs VPN vs TOR vs TOR and VPN together. Internet is a huge and gravely important part of our life these days. It is not …
Read More »Man in the Middle Attack using Kali Linux – MITM attack
The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private …
Read More »