Useful Resources and Concepts
Network Security Posts
Nmap to CSV file – code and explanation
The following code uses the xml.etree.ElementTree library to parse the nmap XML output file, then it uses csv library to create a new CSV file, write the headers and write the data to it. It iterates through the XML elements, extracting the relevant data (e.g. hostname, IP address, port number, protocol, service name, state) and…
Kubernetes Cluster Setup in Laptop Using VirtualBox
Kubernetes Cluster Setup in Local Machine Using VirtualBox and Ubuntu.
Nmap Cheatsheet – Network Mapper tool used to scan networks and devices.
EyeWitness is an open-source tool that is used to take screenshots of the website RDP services, and open VNC servers, provide some server header info and identify default credentials if known.
Increasing Need For Cybersecurity Professionals
There is a significant increase in cybersecurity requirements with the exponential growth of job postings over 94% in just seven years. As opposed to this surge, other IT jobs have just grown over 30% in general. So, that leaves a 300% increase in the demand encompassing all IT job profiles. Cybersecurity happens to account for…
What is DNS? (“The Phonebook of Internet”) – Cheatsheet
DNS, or the Domain Name System, resolves human readable domain names (for example, http://www.hacksheets.in) to machine readable IP addresses (for example, 188.8.131.52).
TCP Three-Way Handshake – CheatSheet
TCP Three way handshake process cheatsheet.
CyberSecurity Practice Labs
CyberSecurity Practice Labs – Get hands-on experience and advance your skills in cyber security using these practice labs.
Something went wrong. Please refresh the page and/or try again.