Dictionary Attacks: Password Lists and Attacks
Man wearing Anonymous mask in a server room

Dictionary Attacks: Password Lists and Attacks

Password Lists and Dictionary Attacks In this Ethical Hacking guide, we are going to talk about password lists, dictionary attacks, and password cracking with tools like Hydra. Passwords ListsA password list, often referred to as a "password dictionary" or simply a "dictionary," is a collection of words, phrases, or character combinations. Password lists are used for various purposes in the realm of cybersecurity, particularly in password-related activities. These lists can serve different functions, and their contents can vary, but their primary…

0 Comments
Blackhat Python: Creating Malware with Python
Ethical Hacking-Blackhat Python

Blackhat Python: Creating Malware with Python

How to Create Malware with Python In this Ethical Hacking Blackhat Python guide we are going to learn about malware. Then we will create some fake malware using Python.What is Malware? Malware is a broad term that refers to any software or code that is specifically designed to damage, disrupt, or gain unauthorized access to computer systems, networks, or devices. The term "malware" is a contraction of "malicious software," and it encompasses various types of harmful software programs created by…

0 Comments
Blackhat Python: Creating a Keylogger with Python
Ethical Hacking-Blackhat Python

Blackhat Python: Creating a Keylogger with Python

How to create a Keylogger with Python In this Ethical hacking guide about Blackhat Python, we will learn about "Keyloggers". Then we will use Python to create our own "Keylogger" script.What is a Keylogger? A keylogger, short for "keystroke logger," is a type of software or hardware device designed to record and monitor the keystrokes made on a computer or mobile device's keyboard. The primary purpose of a keylogger is to capture the keys pressed by a user, including letters,…

0 Comments
Blackhat Python: How to do a Basic Ping
Ethical Hacking-Blackhat Python

Blackhat Python: How to do a Basic Ping

Using Python to Ping an IP Address In this Ethical Hacking guide about Blackhat Python, we are going to learn about the Ping command, what it is and what it does. Then we will cover how to send a simple Ping using Python.What is Ping? The ping command is a network utility available in most operating systems, including Windows, macOS, and various Linux distributions. It is used to test the reachability of a host (typically a computer or network device)…

0 Comments
Blackhat Python: The Ping of Death
Ethical Hacking-Blackhat Python

Blackhat Python: The Ping of Death

The Infamous Ping of Death In this Ethical hacking guide about Blackhat Python, we will learn about the "Ping of Death". Then we will discuss a little about the Scapy Python library. Finally, we will cover how to use Python to create a "Ping of Death" attack.What is the Ping of Death? The "Ping of Death" is a computer network attack or a software bug that can lead to a denial of service (DoS) or crash of a computer system.…

0 Comments
Arduino Hacking Tools: Packet Monitor
Ethical Hacking - Arduino Logo

Arduino Hacking Tools: Packet Monitor

How to Build your own Packet Monitor Device with Arduino In this Arduino Hacking Tools guide, we are going to learn about internet packets. Then we will use Spacehuhn's Packet Monitor project to monitor all the network traffic around you.What is an Internet Packet?An internet packet, often simply referred to as a "packet," is a fundamental unit of data that is transmitted over a computer network. These packets are used to convey information across the Internet and other networks, such…

0 Comments
Arduino Hacking Tools: Beacon Spammer
Ethical Hacking - Arduino Logo

Arduino Hacking Tools: Beacon Spammer

How to Build your own Beacon Spammer Device with Arduino In this Arduino Hacking Tools guide, we are going to learn about beacon frames and fake access points. Then we will use Spacehuhn's beacon spammer project to create fake access points.What is a Beacon Spammer?A "beacon spammer" is a device or software tool that is used to flood a Wi-Fi network with a large number of fake or malicious beacon frames. Beacon frames are a fundamental part of Wi-Fi network…

0 Comments
Arduino Hacking Tools: Deauther
Ethical Hacking - Arduino Logo

Arduino Hacking Tools: Deauther

How to Build your own Wi-Fi Deauther Device with Arduino In this Arduino Hacking Tools guide, we are going to learn about internet packets, deauthentication attacks, and beacon spammers. Then we will make our own deauther device using a D1-Mini, Mini-OLED and some Push buttons. We are going to use Spacehuhn's deauther code for this project. It is a beacon spammer, a packet monitor, and a deauther all rolled into one tidy project.You can upload the code to an ESP8266…

0 Comments
Arduino Hacking Tools: War Driving
Ethical Hacking - Arduino Logo

Arduino Hacking Tools: War Driving

How to Build your own War Driving Device with Arduino War Driving with ArduinoIn this Arduino Hacking Tools guide, we are going to learn about war driving. Then we will make our own war driving device using a D1-Mini, GPS module, and an SD Card module to log the captured data.Components Needed:D1-Mini ESP8266GPS ModuleD1-Mini SD Card ShieldSD CardWhat is War Driving? War driving is the act of using a vehicle to search for and exploit vulnerable wireless networks, such as…

0 Comments
Kali 2022.3 Installation Guide
Ethical Hacking-Kali

Kali 2022.3 Installation Guide

How to Install Kali 2022.3 Kali Linux, the go-to ethical hacking operating system for cybersecurity professionals, is back with its latest iteration, Kali Linux 2022.3. Whether you're a seasoned ethical hacker or just venturing into the world of cybersecurity, this step-by-step guide will help you download the latest version and install Kali Linux and have it up and running in no time.What is Kali? Kali Linux is a popular and widely used open-source Linux distribution specifically designed for penetration testing,…

0 Comments
Raspberry Pi Nature Camera 2022 Highlights
natCam 4

Raspberry Pi Nature Camera 2022 Highlights

The Best Captures for 2022 In 2022, our trusty Raspberry Pi nature camera was again our window into the mesmerizing world of wildlife. From playful squirrels to graceful birds, we've captured some unforgettable moments in the heart of nature. Join us in revisiting the year's most captivating video captures and celebrating the beauty of the great outdoors.Nature Camera 2022-05-17Well, today was just for the Squirrels, and they really love our bird feeder.https://youtu.be/MHmn2Vpqw2Yhttps://youtu.be/NthjnYjXoeIhttps://youtu.be/MxrG6Zcmm50Nature Camera 2022-05-16Unfortunately, today was a really quiet day…

0 Comments
Python: Combining Basic Concepts
python fundamentals

Python: Combining Basic Concepts

A Beginner's Guide to Variables, Loops, and Math Operators in Python In the world of programming, understanding variables, loops, and mathematical operators is fundamental. They form the building blocks for creating powerful and dynamic applications. In this post, we'll embark on a journey to explore these concepts through the creation of a simple yet enlightening project - the "Multiplication Bot." This Python program will continuously calculate multiplication tables, incrementing the numbers indefinitely as it runs.Why the Multiplication Bot? The "Multiplication…

0 Comments
Python: Star Wars Themed Top Trumps Game
python fundamentals

Python: Star Wars Themed Top Trumps Game

Star Wars Top Trumps Style Game with Python The Star Wars universe has always been a source of inspiration for fans across the galaxy, and now, it can also be the backdrop for a thrilling Python-based battle game. Step into the world of lightsabers, droids, and the Force, as you pit iconic Star Wars characters against each other in epic battles, where strategy, luck, and the Force play vital roles in determining the victor.Key Features: Star Wars Characters: The game…

0 Comments
CompTIA Security+: Acronyms Cheat Sheet
secPlus

CompTIA Security+: Acronyms Cheat Sheet

Useful Acronyms You Should Know The world of cybersecurity and the CompTIA Security+ certification course is filled with a plethora of acronyms, each representing essential concepts, technologies, and standards. In this post, we present a comprehensive list of these acronyms to serve as a quick reference and guide for both newcomers and seasoned cybersecurity professionals. Acronym Definition 3DES Triple Data Encryption Standard AAA Authentication, Authorization, and Accounting ABAC Attribute-based Access Control ACL Access Control List AD Active Directory AES Advanced…

0 Comments
CompTIA Security+: Business Continuity Plan
secPlus

CompTIA Security+: Business Continuity Plan

Module 11: The Business Continuity Plan (BCP) is an integral part of an organization's overall strategy, ensuring that it can continue its essential operations in the face of various disruptions. In this post, we will explore the key principles, strategies, and best practices associated with BCP, a vital topic for cybersecurity and your CompTIA Security+ certification.Ensuring Business Continuity Select Business Continuity and Disaster Recovery Processes Develop a Business Continuity Plan Business Continuity and Disaster Recovery Business continuity - A collection…

1 Comment
CompTIA Security+: Addressing Incidents
secPlus

CompTIA Security+: Addressing Incidents

Module 10: In the world of cybersecurity, it's not a matter of "if" but "when" a security incident occurs. Being prepared to address these incidents is essential for safeguarding an organization's data and reputation. In this post, we'll explore the key principles, strategies, and best practices for addressing incidents as part of your CompTIA Security+ cybersecurity journey.Addressing Security Issues Troubleshoot Common Security Issues Respond to Security Incidents Investigate Security Incidents Access Control Issues Access Issue Troubleshooting Tactic Authentication Issues Check…

0 Comments
CompTIA Security+: Operational Security
secPlus

CompTIA Security+: Operational Security

Module 9: Operational security (OPSEC) is a fundamental element of cybersecurity, focusing on safeguarding an organization's critical information and assets from a variety of threats. In this post, we'll explore the key principles, strategies, and best practices of operational security for a CompTIA Security+ professional.Implementing Operational Security Evaluate Security Frameworks and Guidelines Incorporate Documentation in Operational Security Implement Security Strategies Manage Data Security Processes Implement Physical Controls Security Frameworks A conceptual structure for security operations in the organization. Defines how…

0 Comments
CompTIA Security+: Cryptography
secPlus

CompTIA Security+: Cryptography

Module 8: Cryptography plays a pivotal role in safeguarding digital information and communications in the realm of cybersecurity. It is the science of converting plaintext data into a secure and unintelligible format, ensuring that only authorized parties can decipher it. In this post, we'll explore the key concepts of cryptography and its crucial applications for a CompTIA Security+ professional.Implementing Cryptography identify Advanced Cryptography Concepts Select Cryptographic Algorithms Configure a Public Key Infrastructure Enroll Certificates Back Up and Restore Certificates and…

0 Comments