In this article, Sunnet Singh is going to teach you a simple steganography technique to conceal a .zip file inside any .jpg file using only the command prompt in windows 10. Continúa leyendo Steganography (Concealing Secrets)
A RAT is a malicious software which when installed in a victim’s computer or smartphone gives its ‘administrative’ access to a malicious actor(most probably a hacker with bad intent), which allows him to ‘remotely’ execute any arbitrary tasks or scripts on the victim’s computer. Continúa leyendo Android RATs, What and How-To?
On this article Suneet Singh, is going to give us a brief introduction to the OSIN Framework and how it can be used. Continúa leyendo OSINT Framework a Brief Introduction
In this article, divy is going to try to demonstrate in a superficial way, what are this kind of attacks, how you can find them, and how you can mitigate them. Continúa leyendo The Most Common Web Vulnerabilities in Cybersecurity.
In Information Security (InfoSec), when someones says CIA, they are most likely referencing to, Confidentiality, Integrity, and Availability.
We commonly know this three principles as the CIA Triad. Continúa leyendo The CIA Triad
In this document, we will discuss what is CSRF vulnerability, what are the problems if CSRF is exploited, how can you check for it, and how to mitigate it. Continúa leyendo ¿What is CSRF? (Cross-Site Request Forgery)