VNC Penetration Testing

VNC Penetration Testing

In this article, we are discussing Internal Penetration Testing on the VNC server. Through that, we are trying to explain how an attacker can breach security in various scenarios with the installation and configuration, enumeration, and precautions as well. Table of Content Introduction Pre-requisites Lab Setup Port Scanning Password Cracking Port Redirection Exploitation Post Exploitation […]

read more

Kali Linux overview: 14 uses for digital forensics and pentesting

Kali Linux is an operating system designed and built for penetration testing. It is a Linux variant that incorporates a curated list of built-in penetration testing tools. Approximately 600 tools are built into the Kali Linux OS. Kali Linux tool categories Kali Linux provides a wide variety of different tools to support digital forensics and […]

read more

Top 19 Kali Linux tools for vulnerability assessments

Kali Linux is a free operating system and useful for conducting vulnerability assessments and penetration tests. Kali Linux has many tools that can help with vulnerability assessment and network discovery.  There are 19 great tools in Kali Linux for conducting vulnerability assessments and finding security loopholes across various environments. What is a vulnerability assessment tool? […]

read more

How IT teams can help support remote workers: 5 tips

To enable cloud collaboration and remote work, enterprise IT teams can help employees improve home network setups. Image: Andy Wolber/TechRepublic Many IT leaders need to significantly increase the type of support provided to employees who work from home. Too often, organizations hire people, hand them a laptop, accounts and password information and then call the […]

read more

Explore Python for MITRE ATT&CK persistence

MITRE ATT&CK: Persistence The MITRE ATT&CK framework breaks the lifecycle of a cyberattack into a series of objectives that an attacker may have to achieve called tactics. For each of these tactics, MITRE ATT&CK describes various techniques for accomplishing the objective and provides details for each of these. Achieving persistence is one of the tactics […]

read more

How to successfully log in to Docker Hub from the command line interface

If you’re having trouble logging in to Docker Hub from the CLI, Jack Wallen has the fix for you. Image: Docker On several occasions, I’ve run into instances where, when attempting to pull down images from Docker Hub, I was greeted with an authentication error. This issue came into being when Docker Hub changed its […]

read more

Amazon Prime Day scams resurface for 2021

With this year’s Amazon Prime Day set for June 21-22, scammers are already touting “Early Prime Day Deals,” says Bolster. Image: dennizn/Shutterstock Amazon Prime Day represents an opportunity for consumers to find deals and save money on their favorite products. But it’s also a chance for cybercriminals to take advantage of another hot topic to […]

read more

Remote Desktop Penetration Testing (Port 3389)

In this article, we are discussing Remote Desktop penetration testing in four scenarios. Through that, we are trying to explain how an attacker can breach security in a different- different scenario and what types of the major step should take by admin while activating RDP services to resist against attack. Table of Content Introduction Nmap […]

read more