Network Mapping Using Nmap

Network Mapping is a process by which the devices on the network and their connectivity types can be discovered. It is very important for network engineer as well as a penetration tester or a hacker to know this tool. The most preferred way of mapping is using Nmap. What is Nmap? “Nmap is a security … Read moreNetwork Mapping Using Nmap

Just a week into 2018, four cyber attacks already

It’s been a week into 2018, and here we have four major cyber security breaches. From Aadhaar details getting compromised to fake apps stealing banking data, 2018 has presented us with four large scale cyber attacks which potentially affect millions, even billions of people. Here’s a quick read of the 4 attacks……. Aadhaar data access … Read moreJust a week into 2018, four cyber attacks already

MacOS HighSierra “root” vulnerability

On November 28th , Lemi Orhan, an Agile Software Craftsman, tweeted about a bug on MacOS HighSierra which allows anyone have a root access to the computer with the username “root” with a blank password which was later confirmed by Apple. Testing this bug on your Computer If you are testing it on your machine … Read moreMacOS HighSierra “root” vulnerability