January Patch Tuesday resolves 3 Hyper-V zero-days

January Patch Tuesday: Microsoft Resolves 3 Critical Hyper-V Zero-Day Vulnerabilities Microsoft’s January Patch Tuesday rollout has captured significant attention within thecybersecurity community. The tech giant addressed 100 vulnerabilities across itsproduct ecosystem, including three critical zero-day vulnerabilities affecting Hyper-V,its flagship virtualization platform. This update is particularly critical for organizationsrelying heavily on virtualized environments, as these vulnerabilities …

READ MORE

NSLOOKUP

NSLOOKUP IntroductionHaving access to a website’s Domain Name System (DNS) records is helpful when resolvingDNS issues. Users can use tools found in all popular operating systems to query a web serverand obtain crucial data, like IP addresses and other domain-related details. What is nslookup? A command-line program called nslookup can be used to find the …

READ MORE

What is SQLMAP

SQLMAP SQLmap is a popular, free tool used for penetration testing to detect and exploit SQL injection vulnerabilities in web applications. Since its launch in 2006, it has become a go-to tool for improving web security. SQLmap is an open-source program designed to automatically identify and exploit SQL injection weaknesses. It’s packed with features that, …

READ MORE

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites A new “widespread timing-based vulnerability class” that uses a double-click sequence to enable clickjacking attacks and account takeovers on practically all popular websites has been revealed by threat hunters. DoubleClickjacking is the codename given by security researcher Paulos Yibelo to the technique.“Instead of relying on a …

READ MORE

TRY HACK ME : PHISING EMAILS IN ACTION

TRY HACK ME : PHISING EMAILS IN ACTION Task 1: Introduction Now that we covered the basics concerning emails in Phishing Emails 1, let’s dive right into actual phishing email samples.  Each email sample showcased in this room will demonstrate different tactics used to make the phishing emails look legitimate. The more convincing the phishing email appears, …

READ MORE

TRY Hackme  : Passive reconnaissance

TRY Hackme : Passive reconnaissance Task 1 Introduction Welcome to the first room of the Network Security Module. This module covers: Passive Reconnaissance Active Reconnaissance Nmap Live Host Discovery Nmap Basic Port Scans Nmap Advanced Port Scans Nmap Post Port Scans Protocols and Servers Protocols and Servers 2 Network Security Challenge In this room, after …

READ MORE