The most known cyberattack frameworks: how to hunt threats.

Keep saying, the data is a greatest asset of any institution. What is data, why is it so important to keep your data away from bad actors? Data is information that can be stored, transferred or transformed to any machine or human readable form. This contains all of information related to company assets, processes and mechanisms, … Read more

JohnTheRipper vs HashCat. Who is better for password attack?

Today, I would like to show you how to hack a password protected archive using two the most popular tools JohnTheRipper vs HashCat. To do so, we will use two different setups. JohnTheRipper with Kali Linux 2023.01 The first setup is a Kali Linux virtual box: I will use pretty common 9-digits random password just … Read more

The most common attack vectors in 2022: symptoms and mitigation

Hi, folks, I would like to present my chart of the most common attack vectors in 2022. The article follows my research started in Top 10 cloud attack threads and vectors Attack vectors Symptoms Removing Mitigation Malware infection Hard drive or files are not accessibleNew file and foldersSystem restore is not function Quarantine the infected … Read more

Hide your IP with the Proxychains and Tor

Doing as pentester you must strive to be inconspicuous to avoid tracking your identity and block activities. The two common ways do to so are using proxy and VPN. ProxyChains is a UNIX program, that hooks network-related libc functions in dynamically linked programs via a preloaded DLL and redirects the connections through SOCKS4a/5 or HTTP … Read more