informationsecurity
Cybersecurity and Ethical Hacking Terminologies – Flashcards
Cybersecurity and ethical hacking terminologies Flashcards
Kubernetes Cluster Setup in Laptop Using VirtualBox
Kubernetes Cluster Setup in Local Machine Using VirtualBox and Ubuntu.
log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
What is log4shell ? “Log4Shell” got its name by researchers at LunaSec and credited to Chen Zhaojun of Alibaba. It is an remote code execution… Read More »log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
Enabling Root User in Kali Linux
In some of the cases you may need to login using the superuser root in Kali Linux. However, by default the root user in Kali… Read More »Enabling Root User in Kali Linux
Dom Invader – Burp Suite tool to Find DOM Based XSS Easily
Quickly Find Dom-Based XSS Vulnerabilities with Burp Suite’s Dom Invader.
EyeWitness
EyeWitness is an open-source tool that is used to take screenshots of the website RDP services, and open VNC servers, provide some server header info and identify default credentials if known.
Increasing Need For Cybersecurity Professionals
There is a significant increase in cybersecurity requirements with the exponential growth of job postings over 94% in just seven years. As opposed to this surge, other IT jobs have just grown over 30% in general. So, that leaves a 300% increase in the demand encompassing all IT job profiles. Cybersecurity happens to account for about 13% of all IT jobs.
What is DNS? (“The Phonebook of Internet”) – Cheatsheet
DNS, or the Domain Name System, resolves human readable domain names (for example, http://www.hacksheets.in) to machine readable IP addresses (for example, 192.0.1.45).