KALI LINUX

KALI LINUX [1] What is Kali Linux? Kali Linux is a Linux distribution based on Debian that is especially made for penetration testing, ethical hacking, and other cybersecurity-related tasks. Kali Linux, created and maintained by Offensive Security, is considered by many to be among the top platforms for both hackers and security experts. Kali Linux …

READ MORE

Salt Typhoon: A Comprehensive Report on the 2025 Cyberattack on U.S. Telecommunications

Salt Typhoon: A Comprehensive Report on the 2025 Cyberattack on U.S. Telecommunications The year 2025 began with a significant cybersecurity breach that has been dubbed the “Salt Typhoon” attack. This large-scale cyber intrusion targeted major telecommunications companies in the United States, exposing critical vulnerabilities in the nation’s communications infrastructure. This report provides an in-depth analysis …

READ MORE

January Patch Tuesday resolves 3 Hyper-V zero-days

January Patch Tuesday: Microsoft Resolves 3 Critical Hyper-V Zero-Day Vulnerabilities Microsoft’s January Patch Tuesday rollout has captured significant attention within thecybersecurity community. The tech giant addressed 100 vulnerabilities across itsproduct ecosystem, including three critical zero-day vulnerabilities affecting Hyper-V,its flagship virtualization platform. This update is particularly critical for organizationsrelying heavily on virtualized environments, as these vulnerabilities …

READ MORE

NSLOOKUP

NSLOOKUP IntroductionHaving access to a website’s Domain Name System (DNS) records is helpful when resolvingDNS issues. Users can use tools found in all popular operating systems to query a web serverand obtain crucial data, like IP addresses and other domain-related details. What is nslookup? A command-line program called nslookup can be used to find the …

READ MORE

What is SQLMAP

SQLMAP SQLmap is a popular, free tool used for penetration testing to detect and exploit SQL injection vulnerabilities in web applications. Since its launch in 2006, it has become a go-to tool for improving web security. SQLmap is an open-source program designed to automatically identify and exploit SQL injection weaknesses. It’s packed with features that, …

READ MORE

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites A new “widespread timing-based vulnerability class” that uses a double-click sequence to enable clickjacking attacks and account takeovers on practically all popular websites has been revealed by threat hunters. DoubleClickjacking is the codename given by security researcher Paulos Yibelo to the technique.“Instead of relying on a …

READ MORE

TRY HACK ME : PHISING EMAILS IN ACTION

TRY HACK ME : PHISING EMAILS IN ACTION Task 1: Introduction Now that we covered the basics concerning emails in Phishing Emails 1, let’s dive right into actual phishing email samples.  Each email sample showcased in this room will demonstrate different tactics used to make the phishing emails look legitimate. The more convincing the phishing email appears, …

READ MORE

TRY Hackme  : Passive reconnaissance

TRY Hackme : Passive reconnaissance Task 1 Introduction Welcome to the first room of the Network Security Module. This module covers: Passive Reconnaissance Active Reconnaissance Nmap Live Host Discovery Nmap Basic Port Scans Nmap Advanced Port Scans Nmap Post Port Scans Protocols and Servers Protocols and Servers 2 Network Security Challenge In this room, after …

READ MORE